Thunderbolt Vulnerability Allows Hackers To Access Pcs In Less Than Five Minutes
According to the researcher, this method of attack requires physical access to the device, therefore port connectivity such as Thunderbolt can be exploited for this breach. The primary reason why the port is effective is due to its fast protocol which partially allows direct access to a computer’s memory. Ruytenberg added that there is actually a feature built into the Thunderbolt firmware called “Security Level”, which disallows access to untrusted devices and even turns off the port altogether....