If an attacker can get his hands on a Thunderbolt-equipped device for five minutes, he can launch a new data-stealing attack called “Thunderspy.” A new attack enables bad actors to steal data from ...
Security researchers have discovered Thunderbolt vulnerabilities that could leave millions of computers exposed to attackers who have the right hardware tools and a few minutes with the machine. The ...
Security researchers have unearthed a set of severe vulnerabilities involving the Intel and Apple-developed Thunderbolt peripheral and charging connector interface that allow attackers to fully take ...
Microsoft has outlined how its new breed of Windows 10 Secured-Core PCs can help companies mitigate the threat of the recently disclosed Thunderspy attacks on devices with a Thunderbolt interface.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results