Thunderbolt flaw lets hackers steal your data in ‘five minutes’
However, Ruytenberg’s attack method could get around even those settings by changing the firmware that controls the Thunderbolt port, allowing any device to access it. What’s more, the hack…
Visit link: Thunderbolt flaw lets hackers steal your data in ‘five minutes’
