{"id":11721,"date":"2018-06-05T07:00:17","date_gmt":"2018-06-05T11:00:17","guid":{"rendered":"https:\/\/southjerseytechies.net\/blog\/?p=11721"},"modified":"2026-01-29T09:59:56","modified_gmt":"2026-01-29T14:59:56","slug":"what-you-need-to-know-about-the-big-chip-security-problem","status":"publish","type":"post","link":"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/","title":{"rendered":"What You Need to Know About the Big Chip Security Problem"},"content":{"rendered":"<div class=\"lede-video-v2 lede\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-11730 \" src=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2018\/05\/intel_sjtechies.net_.png\" alt=\"\" width=\"603\" height=\"302\" srcset=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2018\/05\/intel_sjtechies.net_.png 1000w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2018\/05\/intel_sjtechies.net_-300x150.png 300w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2018\/05\/intel_sjtechies.net_-768x384.png 768w\" sizes=\"auto, (max-width: 603px) 100vw, 603px\" \/><\/p>\n<div><\/div>\n<div class=\"lede-video-v2__caption\">According to Intel Corp.,most of the processors running the world\u2019s computers and smartphones have a feature that makes them susceptible to hacker attacks. The chipmaker, working with partners and rivals,\u00a0says\u00a0it has already issued updates\u00a0to protect most processor products introduced in the past five years, but the news sparked concern about this fundamental building block of the\u00a0internet, PCs and corporate networks.<\/div>\n<\/div>\n<div class=\"body-columns\">\n<div class=\"middle-column\">\n<div class=\"body-copy-v2 fence-body\">\n<p>The revelation of the so-called\u00a0Meltdown and Spectre vulnerabilities spurred a scramble among technology\u2019s biggest players, from\u00a0Apple Inc.\u00a0to\u00a0Amazon.com Inc., to enact fixes and reassure customers they were on top of the problem.<\/p>\n<h4><strong>1. What\u2019s the problem?<\/strong><\/h4>\n<p>Modern processors guess what they\u2019ll have to do next and fetch the data they think they\u2019ll need. That makes everything from supercomputers to smartphones operate very fast. Unfortunately, as Google researchers\u00a0<a title=\"Website detailing the Meltdown and Spectre bugs\" href=\"https:\/\/meltdownattack.com\/\" target=\"_blank\" rel=\"nofollow noopener\">discovered<\/a>, it also provides a way for bad actors to read data stored in memory that had been thought to be secure. In a worst-case scenario, that would let someone access your passwords.<\/p>\n<h4><strong>2. How bad is it?<\/strong><\/h4>\n<p>The vulnerability won\u2019t stop your computer working and doesn\u2019t provide an avenue for hackers to put malicious software on your machine. Though it could put important data at risk, there\u2019s been no report so far of anyone\u2019s computer being attacked in this manner. More broadly, though, the new fears could undermine longtime assurances that hardware and chip-level security is more tamper-proof than software.<\/p>\n<h4><strong>3. How was it discovered?<\/strong><\/h4>\n<p>The weakness was discovered last year by folks Google employs to find such issues before the bad guys do. Usually, solutions are developed in private and announced in a coordinated way. This time the news leaked before the companies involved had a chance to get a fix in place.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-11733\" src=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2018\/05\/amazon-apple-google.jpg\" alt=\"\" width=\"440\" height=\"143\" srcset=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2018\/05\/amazon-apple-google.jpg 400w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2018\/05\/amazon-apple-google-300x98.jpg 300w\" sizes=\"auto, (max-width: 440px) 100vw, 440px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h4><strong>4. What\u2019s being done to fix it?<\/strong><\/h4>\n<p>Chipmakers and operating system providers, such as\u00a0Alphabet Inc.\u2019s Google and Microsoft Corp., are rushing to create software patches that will close the potential window of attack. Intel\u00a0said\u00a0that it expects to have issued updates for more than 90 percent of recently introduced processor products. Amazon.com Inc. said \u201call but a small single-digit percentage\u201d of its servers have already been protected. In a blog post, Google said its security teams immediately \u201cmobilized to defend\u201d its systems and user data. Some customers of Android devices, Google Chromebook laptops and its cloud services still need to take steps to patch security holes, the company said. Patches for Windows devices are out now and the company is securing its cloud services, Microsoft said in a statement.<\/p>\n<h4><strong>5. Is this just an Intel problem?<\/strong><\/h4>\n<p>No, though that seems to be what panicky investors initially thought. Intel says it\u2019s an issue for all modern processors. But rival\u00a0Advanced Micro Devices Inc.\u00a0stated that its products are at \u201cnear-zero risk.\u201d\u00a0ARM Holdings, which has chip designs that support all smartphones,\u00a0said\u00a0that, at worst, the vulnerability could \u201cresult in small pieces of data being accessed\u201d and advised users of its technology to keep their software up to date. Google fingered all three companies. Apple\u00a0said\u00a0all Mac computers and iOS devices &#8212; including iPhones and iPads &#8212; were affected, but stressed there were no known exploits impacting users and that steps taken to address the issue haven\u2019t dented performance.<\/p>\n<h4><strong>6. What will the fallout be?<\/strong><\/h4>\n<p>Some computers, mostly older ones, could be slowed down by the software patches that will make them more secure. Intel said that in common situations software might be slowed down by as much as 3 percent or not at all. But in other rare situations, performance might be reduced as much as 30 percent. The company doesn\u2019t expect any financial impact and said it thinks customers will keep buying. As the fixes haven\u2019t been widely deployed yet, it\u2019s unclear whether anyone will even notice or whether computer slowdowns will be widespread. Intel has only done lab tests.<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>According to Intel Corp.,most of the processors running the world\u2019s computers and smartphones have a feature that makes them susceptible to hacker attacks. The chipmaker, working with partners and rivals,\u00a0says\u00a0it has already issued updates\u00a0to protect most processor products introduced in &hellip;<\/p>\n<p><a href=\"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/\">Continue Reading<span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":219,"featured_media":11730,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_links_to":"","_links_to_target":""},"categories":[157,210,473,211,107,352,353,45,142,8,1829,103],"tags":[2201,2202,2203,2207,2205,2206,2200,1179,2204],"class_list":["post-11721","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apple","category-hardware","category-internet-security","category-laptops","category-news","category-pcs","category-processor","category-quick-reference-guides","category-security","category-software","category-technology","category-tips-info","tag-big-chip-security","tag-chipmakers","tag-computer-meltdown","tag-how-to-keep-your-data-secure","tag-modern-processors","tag-problems-with-modern-processors","tag-sjtechies-com","tag-southjerseytechies-net","tag-spectre-vulnerabilities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>South Jersey Techies - What You Need to Know About the Big Chip Security Problem<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What You Need to Know About the Big Chip Security Problem\" \/>\n<meta property=\"og:description\" content=\"According to Intel Corp.,most of the processors running the world\u2019s computers and smartphones have a feature that makes them susceptible to hacker attacks. The chipmaker, working with partners and rivals,\u00a0says\u00a0it has already issued updates\u00a0to protect most processor products introduced in the past five years, but the news sparked concern about this fundamental building block of the\u00a0internet, PCs and corporate networks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/\" \/>\n<meta property=\"og:site_name\" content=\"South Jersey Techies\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sjtechies\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-05T11:00:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T14:59:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2018\/05\/intel_sjtechies.net_.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Website Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:site\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Website Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/\"},\"author\":{\"name\":\"Website Admin\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f\"},\"headline\":\"What You Need to Know About the Big Chip Security Problem\",\"datePublished\":\"2018-06-05T11:00:17+00:00\",\"dateModified\":\"2026-01-29T14:59:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/\"},\"wordCount\":666,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2018\/05\/intel_sjtechies.net_.png\",\"keywords\":[\"Big Chip Security\",\"chipmakers\",\"computer meltdown\",\"How to keep your data secure\",\"Modern processors\",\"Problems with modern processors\",\"sjtechies.com\",\"southjerseytechies.net\",\"Spectre Vulnerabilities\"],\"articleSection\":[\"Apple\",\"Hardware\",\"Internet Security\",\"Laptops\",\"News\",\"PCs\",\"Processor\",\"Quick Reference Guides\",\"Security\",\"Software\",\"Technology\",\"Tips &amp; Info\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/\",\"name\":\"South Jersey Techies - What You Need to Know About the Big Chip Security Problem\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2018\/05\/intel_sjtechies.net_.png\",\"datePublished\":\"2018-06-05T11:00:17+00:00\",\"dateModified\":\"2026-01-29T14:59:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/#primaryimage\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2018\/05\/intel_sjtechies.net_.png\",\"contentUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2018\/05\/intel_sjtechies.net_.png\",\"width\":1000,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/southjerseytechies.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What You Need to Know About the Big Chip Security Problem\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"name\":\"South Jersey Techies\",\"description\":\"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP\",\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\",\"name\":\"South Jersey Techies, LLC\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"contentUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"width\":291,\"height\":201,\"caption\":\"South Jersey Techies, LLC\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/sjtechies\",\"https:\/\/x.com\/sjtechies\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f\",\"name\":\"Website Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"caption\":\"Website Admin\"},\"sameAs\":[\"http:\/\/www.southjerseytechies.net\"],\"url\":\"https:\/\/southjerseytechies.net\/blog\/author\/support\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"South Jersey Techies - What You Need to Know About the Big Chip Security Problem","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/","og_locale":"en_US","og_type":"article","og_title":"What You Need to Know About the Big Chip Security Problem","og_description":"According to Intel Corp.,most of the processors running the world\u2019s computers and smartphones have a feature that makes them susceptible to hacker attacks. The chipmaker, working with partners and rivals,\u00a0says\u00a0it has already issued updates\u00a0to protect most processor products introduced in the past five years, but the news sparked concern about this fundamental building block of the\u00a0internet, PCs and corporate networks.","og_url":"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/","og_site_name":"South Jersey Techies","article_publisher":"https:\/\/www.facebook.com\/sjtechies","article_published_time":"2018-06-05T11:00:17+00:00","article_modified_time":"2026-01-29T14:59:56+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2018\/05\/intel_sjtechies.net_.png","type":"image\/png"}],"author":"Website Admin","twitter_card":"summary_large_image","twitter_creator":"@sjtechies","twitter_site":"@sjtechies","twitter_misc":{"Written by":"Website Admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/#article","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/"},"author":{"name":"Website Admin","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f"},"headline":"What You Need to Know About the Big Chip Security Problem","datePublished":"2018-06-05T11:00:17+00:00","dateModified":"2026-01-29T14:59:56+00:00","mainEntityOfPage":{"@id":"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/"},"wordCount":666,"commentCount":0,"publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/#primaryimage"},"thumbnailUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2018\/05\/intel_sjtechies.net_.png","keywords":["Big Chip Security","chipmakers","computer meltdown","How to keep your data secure","Modern processors","Problems with modern processors","sjtechies.com","southjerseytechies.net","Spectre Vulnerabilities"],"articleSection":["Apple","Hardware","Internet Security","Laptops","News","PCs","Processor","Quick Reference Guides","Security","Software","Technology","Tips &amp; Info"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/","url":"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/","name":"South Jersey Techies - What You Need to Know About the Big Chip Security Problem","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/#primaryimage"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/#primaryimage"},"thumbnailUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2018\/05\/intel_sjtechies.net_.png","datePublished":"2018-06-05T11:00:17+00:00","dateModified":"2026-01-29T14:59:56+00:00","breadcrumb":{"@id":"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/#primaryimage","url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2018\/05\/intel_sjtechies.net_.png","contentUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2018\/05\/intel_sjtechies.net_.png","width":1000,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/southjerseytechies.net\/blog\/what-you-need-to-know-about-the-big-chip-security-problem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/southjerseytechies.net\/blog\/"},{"@type":"ListItem","position":2,"name":"What You Need to Know About the Big Chip Security Problem"}]},{"@type":"WebSite","@id":"https:\/\/southjerseytechies.net\/blog\/#website","url":"https:\/\/southjerseytechies.net\/blog\/","name":"South Jersey Techies","description":"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP","publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/southjerseytechies.net\/blog\/#organization","name":"South Jersey Techies, LLC","url":"https:\/\/southjerseytechies.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","contentUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","width":291,"height":201,"caption":"South Jersey Techies, LLC"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sjtechies","https:\/\/x.com\/sjtechies"]},{"@type":"Person","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f","name":"Website Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","caption":"Website Admin"},"sameAs":["http:\/\/www.southjerseytechies.net"],"url":"https:\/\/southjerseytechies.net\/blog\/author\/support\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2018\/05\/intel_sjtechies.net_.png","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8eT50-333","_links":{"self":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/11721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/users\/219"}],"replies":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/comments?post=11721"}],"version-history":[{"count":6,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/11721\/revisions"}],"predecessor-version":[{"id":17394,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/11721\/revisions\/17394"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/media\/11730"}],"wp:attachment":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/media?parent=11721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/categories?post=11721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/tags?post=11721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}