
“Dubbed ‘Thunderstrike 2,’ the new proof-of-concept attack still spreads primarily through infected Thunderbolt accessories. But where the original Thunderstrike required a malicious user to have physical access to your computer to work—something sometimes referred to as an ‘evil maid’ attack—the new one can be spread remotely. The malware can be delivered ‘via a phishing e-mail and malicious Web site,’ and once downloaded it can infect connected accessories that use Option ROM (Apple’s Thunderbolt-to-gigabit-Ethernet accessory is a commonly cited example). Once the accessory is infected, the malware can spread to any Mac that you plug the accessory into.”
Related posts:
'South Park' tackles the NSA, just not as expected
Texas, Oklahoma Outlaw Voter-Approved Local Fracking Bans
Washington state bill would forgive all minor marijuana convictions
Federal Agencies Trade Motorist Data to Insurance Companies
Mob Rule in Boston
10 things the FBI won’t fire you for
It's Time to End the Paid Militarization of the NFL
This Public Preschool Looks Like a Prison
Details About BitcoinWallet.com $250,000 Reported Sale
2 FBI Agents Involved in Dzhokhar Tsarnaev's Arrest Killed During 'Training Exercise'
Microsoft beats Google by adding Bitcoin currency conversion to Bing
Pre-Internet Laws Are Jeopardizing Today's Electronic Privacy
Sterilization Won't Cost Women A Penny Under Obamacare
And the Winner of Bush’s Iraq War Is . . . Iran!
ECB Warning: More Directed History