AMD was able to prove the integrity of its processors in court
Under current U.S. law, companies subject to it must regularly mention in forms 8-K, 10-Q, and 10-K the major risk factors that threaten the business or may result in serious losses to shareholders. As a rule, investors or shareholders constantly submit claims to the court to the management of companies, and pending claims are also mentioned in the section of risk factors. |
Last year, AMD had to face a class action from shareholders who claimed that management deliberately downplayed the degree of vulnerability of the Spectre type of the second option, using this information to artificially increase the share price of AMD at a time when there was an active discussion about the vulnerability of Intel processors to Meltdown and Spectre vulnerabilities. The plaintiffs claimed that AMD has been hiding data about these vulnerabilities from the public for too long, although Google Project Zero experts notified the company about their presence in mid-2017. AMD did not make direct mention of vulnerabilities in forms 8-K, 10-Q and 10-K until the end of the year, and only decided to speak on January 3, 2018, when the fact of the existence of vulnerabilities became public at the initiative of one British tabloid.
The plaintiffs claimed that the statements from the third of January and later in the next few days an interview with representatives from AMD attempted to reduce the significance of the vulnerability of the Spectre of the second option, calling the possibility of its practical implementation by an attacker is "close to zero". This formulation can now be found in a special section of the AMD website. Further on the text of the statement the company claims that "vulnerability to option 2 is not yet found in AMD processors".
On January 11, 2018, an extended press release is released, in which AMD already talks about the need to take measures to protect against the Spectre vulnerability of the second option. The processor developer does not hide that this type of vulnerability is applicable to them, to further minimize the threat, operating system and microcode updates are beginning to spread.
|Category: Business | Views: 171 ||
|Total comments: 0|