75% of all computers with Intel processors are under threat of hacking

The attack is carried out using four errors in the microcode of the Intel chip.During the application of the leading

commands, the system on the chip tries to understand what data it canwill be needed to perform these processes.

In case the forecast turns out to be false,the system resets the data query results. However, during an attack on the processor, there are a lot of requests that it does not have time to process and refers to a special microcode to prevent failure.

During the reboot, the ZombieLoad error is enabled, which remains in the special processor cache and can receive any data that is used by the cores.

Apple, Microsoft and Google have already released updates that eliminate the vulnerability.