Intel Thunderbolt flaw lets hackers take data in five minutes

CERT-LatestNews ThreatsCybercrime ThreatsStrategic

The Thunderspy vulnerability can be exploited even if a drive is encrypted or the computer is locked and set to sleep, according to Eindhoven University of Technology researcher Bjorn Ruytenberg. Thunderspy doesn’t require a user to click on a phishing link or get tricked into using a malicious….