“Dubbed ‘Thunderstrike 2,’ the new proof-of-concept attack still spreads primarily through infected Thunderbolt accessories. But where the original Thunderstrike required a malicious user to have physical access to your computer to work—something sometimes referred to as an ‘evil maid’ attack—the new one can be spread remotely. The malware can be delivered ‘via a phishing e-mail and malicious Web site,’ and once downloaded it can infect connected accessories that use Option ROM (Apple’s Thunderbolt-to-gigabit-Ethernet accessory is a commonly cited example). Once the accessory is infected, the malware can spread to any Mac that you plug the accessory into.”
Related posts:
Liberty Slipping: 10 Things You Could Do in 1975 That You Can't Do Now
How to steal Bitcoin in three easy steps
Researcher Identifies Hidden Data-Acquisition Services in iOS
Facebook yields to remove Hezbollah page under CIA pressure
Printable 3D Gun Creator Meets Alex Jones
'Silk Road 2.0' Launches, Promising A Resurrected Black Market
Why Are So Many People Choosing To Leave The United States Permanently?
Kissinger: "Pre-Emptive Attack" Against North Korea "Is Strong" Possibility
Tracking School Children With RFID Tags? It’s All About the Benjamins
The Only Legal Way to Opt out of Obamacare
NSA uses radio-waves for surveillance, cyber-attacks on offline systems
Mexico's audit office tells Bank of Mexico to verify gold held at Bank of England
Taper Is Coming. Stock Market Rises.
WikiLeaks: Snowden Risks Being Stuck in Russia 'Permanently'
Another 'War is Peace' Award (This Time Hollande Wins!)