Find a Question:
Loophole Thunderstrike 2 displays Mac computers to penetrate the remote
Researchers succeeded in establishing worm Computer Worm can penetrate injury Mac computers produced by Apple through the port “Thunderbolt” button on these devices the definition of that.
And carry this gap Thunderstrike 2 use the same name, a mechanism of action that have been used before in the gap Thunderstrike, which managed devices from infecting Windows operating system produced by companies such as HP, Dell, and Lenovo earlier than last year.
These worm transition between two Mac even without the presence of contact, including through the network, once reached any storage medium, screen or any device via Thunderbolt port, or Ethernet, or even a USB flash drive, they move immediately to him, and after he arrived to another host another begins its work to me.
You can start this kind of attack through e-mail or some malicious websites, so the researchers suggested that encryption devices on computers and updated definitions to prevent any exploitation by hackers in the future.Viewing:-178
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!