All you need to know about preventing adversaries from exploiting the recently disclosed vulnerabilities in the Thunderbolt interface

The post Thunderspy attacks: What they are, who’s at greatest risk and how to stay safe appeared first on WeLiveSecurity