The exploit exists via the Thunderbolt port on your desktop or laptop, and the only saving grace is that it cannot be exploited remotely.from Top Tech News- News18.com https://ift.tt/2YRDuPP
The exploit exists via the Thunderbolt port on your desktop or laptop, and the only saving grace is that it cannot be exploited remotely.