Home Security At CES, Intel chief mum on shares sale after bug disclosure

At CES, Intel chief mum on shares sale after bug disclosure

At CES, Intel chief mum on shares sale after bug disclosure Featured

Intel chief executive Brian Krzanich has avoided making any mention of his controversial sale of stock and options in a keynote at the Consumer Electronics Show in Las Vegas, though he did touch on the two vulnerabilities found in most processors produced by the company he heads.

Krzanich sold 245,743 shares owned by him and 644,135 shares obtained by exercising his options, under a divestiture plan put in place on 30 October last year. Google revealed details of the Meltdown and Spectre bugs to Intel in June 2017. While Intel claims that the stock sale was part of a planned divestiture, Krzanich put the plan in place only in October.

The Intel chief spent less than two minutes talking about the company's security problems; his keynote (watch video below from about 58:00 onwards) was preceded by about 16 minutes of music.

"Our primary goal has been to keep our customers safe," he said. "As of now, we have not received any information that these exploits have been used to obtain customer data."

He advised those affected to apply any updates that were released by software suppliers, adding that software fixes for 90% of its processors issued during the last five years would be be issued by the end of the week. The remainder of the fixes would be issued by the end of January.

krzanich vertKrzanich thanked technology firms for working with Intel to provide fixes, adding that the performance hit expected when software fixes are applied will vary from case to case. ""We'll continue working with the industry to minimise the impact on those workloads over time," he added.

The Wall Street Journal, meanwhile, quoted lawyers and analysts who track executive stock sales as saying that Krzanich's sale risked attracting the attention of regulators.

One lawyer, Dan O'Connor who is a specialist in securities and works for Ropes & Gray, called the sale "really odd".

“The timing, the size, the unusual nature compared to prior sales – that’s going to get this a lot of scrutiny,” O'Connor added.

The WSJ said its request for an interview with Krzanich was turned down, noting that Intel was yet to divulge when Krzanich was informed about the bugs.

It quoted Ben Silverman, a researcher at InsiderScore, as saying that Krzanich's trade was noticeable because it differed from his previous sales; in those cases, he had exercised options or sold shares monthly or quarterly, with less than 80,000 shares being involved at any one time.

In a leaked memo, Krzanich said that the company would create a new internal security group. The news was reported shortly before Monday's keynote address.

Intel human resources chief Leslie Culbertson will run the new group, called Intel Product Assurance and Security.

"It is critical that we continue to work with the industry, to excel at customer satisfaction, to act with uncompromising integrity, and to achieve the highest standards of excellence," Krzanich told employees in the memo which was obtained by The Oregonian/OregonLive. "Simply put, I want to ensure we continue to respond appropriately, diligently, and with a customer-first attitude."

Intel was contacted for comment and a spokerperson told iTWire that the stoick sale was unrelated.


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips



Ransomware attacks on businesses and institutions are now the most common type of malware breach, accounting for 39% of all IT security incidents, and they are still growing.

Criminal ransomware revenues are projected to reach $11.5B by 2019.

With a few simple policies and procedures, plus some cutting-edge endpoint countermeasures, you can effectively protect your business from the ransomware menace.


Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.


Popular News