Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
May 11, 2020Thunderbolt port is a weak spot in PCs1 minutePlayPhysical hackers only need a few minutes to read and copy data on a PC, even if it's locked or asleep. Learn more about your ad choices. Visit megaphone.fm/adchoices...moreShareView all episodesBy CNETMay 11, 2020Thunderbolt port is a weak spot in PCs1 minutePlayPhysical hackers only need a few minutes to read and copy data on a PC, even if it's locked or asleep. Learn more about your ad choices. Visit megaphone.fm/adchoices...more
Physical hackers only need a few minutes to read and copy data on a PC, even if it's locked or asleep. Learn more about your ad choices. Visit megaphone.fm/adchoices
May 11, 2020Thunderbolt port is a weak spot in PCs1 minutePlayPhysical hackers only need a few minutes to read and copy data on a PC, even if it's locked or asleep. Learn more about your ad choices. Visit megaphone.fm/adchoices...more
Physical hackers only need a few minutes to read and copy data on a PC, even if it's locked or asleep. Learn more about your ad choices. Visit megaphone.fm/adchoices