All you need to know about preventing adversaries from exploiting the recently disclosed vulnerabilities in the Thunderbolt interface
The post Thunderspy attacks: What they are, who’s at greatest risk and how to stay safe appeared first on WeLiveSecurity
from WeLiveSecurity https://ift.tt/2XdPn1c
via IFTTT