Your Mac Is No Longer Safe: Thunderbolt Ports Let Badass Rip Off Data In Minutes
Anil
No Mac machine is proof against this vulnerability.
- Best Gaming Phones 2025: Top Devices for Mobile Gaming
- Receive Buffers And Other Tips To Improve Your Internet Connection
- Apple Kills Original HomePod, Focusing On HomePod Mini
Mac devices are now prone to hackers because of a “physical” flaw that takes place in Thunderbolt ports. In such a case, the attacker is said to access your data without having any permission. What’s more, this still happens when your Mac is protected by a password and the drive already gets encrypted.
>>> Exam Season Is Coming, But This Hacked Calculator Would Turn You Into A Holy Cheater!
Security researcher Bjorn Ruytenberg has shed a light on the problem, so let’s take a closer look at it. First things first, no Mac machine is proof against this serious vulnerability. Models between 2011 and 2020 – which support Thunderbolt and USB-C ports – all come under attack.
According to Ruytenberg, the controller chip inside Intel’s Thunderbolt ports has triggered off the vulnerability. Seven different types of vulnerabilities were discovered by Ruytenberg, and the researcher worked on several methods to exploit them. Hackers can keep the attack behind closed doors, so most users are unaware of it, not to mention that it’s hard to find a shred of evidence.
For those having a Mac, all your need to do is to keep potential badasses far away from your computer because the attacker won’t trap you into a phishing link or malware but he needs to have physical contact with the device. Once he gets a chance, it’ll take him only a few minutes to break in and steal the data.
Having said that, levels of the risk mainly depend on the current operating system. If you’re running Linux or Windows in Bootcamp, your computer is no doubt fully vulnerable. Ruytenberg said it’ll be partially vulnerable once you boot it into macOS, thanks to a bunch of additional security features updated by Apple.
>>> Is Your TikTok Account Safe Enough? Well, Just Make Sure That You've Followed These Steps
Featured Stories
ICT News - Mar 24, 2026
OpenAI on the Brink: Major Setbacks Signal the Bursting of the AI Bubble
ICT News - Mar 20, 2026
Top 10 Most Popular Social Media Sites Based on User Count in 2026
ICT News - Mar 19, 2026
Billion Dollar Blunder: Meta Shuts Down Metaverse After Wasting $80,000,000,000.00
ICT News - Mar 18, 2026
X to Introduce Regional Controls for Posts and Replies
ICT News - Mar 17, 2026
Is DLSS 5 Helping Games or Hurting Developers' Creative Style?
ICT News - Mar 16, 2026
AI's Role in Warfare: US Strikes on Iran Unveiled
ICT News - Mar 15, 2026
Elon Musk's Bold Chip Venture: Tesla's Massive Fab Initiative Sparks AI Hardware...
ICT News - Mar 14, 2026
Elon Musk's High-Stakes $109 Billion Lawsuit Against OpenAI and Microsoft
ICT News - Mar 05, 2026
X Platform Implements Strict Measures Against Fake AI-Generated Videos Amid Iran...
How To - Mar 04, 2026
Getting Started with AI: A Newbie's Simple Guide
Read More
ICT News- Mar 24, 2026
OpenAI on the Brink: Major Setbacks Signal the Bursting of the AI Bubble
The era of unchecked AI hype appears to be ending, and the bubble is finally bursting.
Features- Mar 24, 2026
How to Use GeForce NOW to Play Video Games Without Actual Hardware
GeForce NOW makes PC gaming accessible to a wider audience by removing the barrier of expensive hardware.