Intel ($INTC) issued a press release to deny the accusations of a security flaw in the hardware. It included AMD and others in the companies also facing the security problem. But here's one one users posted on this AMD Article.Intel is putting out MISLEADING press releases. The Intel Bug allows reading of private data anywhere on the machine, including virtual machines on the same hardware. Intel Bug is Heartbleed 2.0 Exact quote from an AMD engineer. AMD processors are not subject to the types of attacks that the kernelpage table isolation feature protects against. The AMD microarchitecturedoes not allow memory references, including speculative references, thataccess higher privileged data when running in a lesser privileged modewhen that access would result in a page fault. Disable page table isolation by default on AMD processors by not settingthe X86_BUG_CPU_INSECURE feature, which controls whether X86_FEATURE_PTIis set.AMD rebukes Intel, says flaw poses 'near-zero risk' to its chips: "To be clear, the security research team identified three variants targeting speculative execution. The threat and the response to the three variants differ by microprocessor company, and AMD is not susceptible to all three variants. Due to differences in AMD's architecture, we believe there is a near zero risk to AMD processors at this time. "Related: Nvidia $NVDA stormed past $200/share on Jan 3.