Loophole Thunderstrike 2 displays Mac computers to penetrate the remote

Aug

5

2015

Researchers succeeded in establishing worm Computer Worm can penetrate injury Mac computers produced by Apple through the port “Thunderbolt” button on these devices the definition of that.

And carry this gap Thunderstrike 2 use the same name, a mechanism of action that have been used before in the gap Thunderstrike, which managed devices from infecting Windows operating system produced by companies such as HP, Dell, and Lenovo earlier than last year.

These worm transition between two Mac even without the presence of contact, including through the network, once reached any storage medium, screen or any device via Thunderbolt port, or Ethernet, or even a USB flash drive, they move immediately to him, and after he arrived to another host another begins its work to me.

You can start this kind of attack through e-mail or some malicious websites, so the researchers suggested that encryption devices on computers and updated definitions to prevent any exploitation by hackers in the future.

In: Technology & Gadgets Asked By: [18456 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »


Star Points Scale

Earn points for Asking and Answering Questions!

Grey Sta Levelr [1 - 25 Grey Star Level]
Green Star Level [26 - 50 Green Star Level]
Blue Star Level [51 - 500 Blue Star Level]
Orange Star Level [501 - 5000 Orange Star Level]
Red Star Level [5001 - 25000 Red Star Level]
Black Star Level [25001+ Black Star Level]