“Dubbed ‘Thunderstrike 2,’ the new proof-of-concept attack still spreads primarily through infected Thunderbolt accessories. But where the original Thunderstrike required a malicious user to have physical access to your computer to work—something sometimes referred to as an ‘evil maid’ attack—the new one can be spread remotely. The malware can be delivered ‘via a phishing e-mail and malicious Web site,’ and once downloaded it can infect connected accessories that use Option ROM (Apple’s Thunderbolt-to-gigabit-Ethernet accessory is a commonly cited example). Once the accessory is infected, the malware can spread to any Mac that you plug the accessory into.”
Related posts:
U.S. cops stock up on radars that can see through walls
US Department of Treasury Targets Bitcoin Poker Sites
Illinois Bill to Register Buyers of Gold and Silver Coins
Crypto Mining Giant Bitmain Valued at $12 Billion in New Funding Round
Cops charged after body cams capture them killing homeless camper
British UKIP Convulsion Significant Threat to Tories
Amazon Facial Recognition Confuses Members of Congress with Criminals
Dash cam video exposes cops killing man during routine traffic stop
BIS Chief to Crypto Coders: 'Stop Trying to Create Money'
“Mental Illness” Diagnoses Are the Slippery Slope to Gun Confiscation
Bank of Canada Holds Swiss, Dutch, Swedish Gold
Ninth Circuit Gives the A-OK For Warrantless Home Video Surveillance
Martial Law in Boston Did Not Catch the Suspect
Red State? Blue State? Try Green
Entrepreneurs, Engineers, Evangelists: Crypto Currency Con 2013