Advertisement
Australia markets closed
  • ALL ORDS

    7,817.40
    -81.50 (-1.03%)
     
  • ASX 200

    7,567.30
    -74.80 (-0.98%)
     
  • AUD/USD

    0.6424
    -0.0001 (-0.02%)
     
  • OIL

    83.06
    +0.33 (+0.40%)
     
  • GOLD

    2,407.60
    +9.60 (+0.40%)
     
  • Bitcoin AUD

    100,590.82
    +1,449.85 (+1.46%)
     
  • CMC Crypto 200

    1,375.22
    +62.59 (+5.01%)
     
  • AUD/EUR

    0.6022
    -0.0009 (-0.14%)
     
  • AUD/NZD

    1.0894
    +0.0019 (+0.17%)
     
  • NZX 50

    11,796.21
    -39.83 (-0.34%)
     
  • NASDAQ

    17,185.35
    -208.97 (-1.20%)
     
  • FTSE

    7,897.74
    +20.69 (+0.26%)
     
  • Dow Jones

    37,933.31
    +157.93 (+0.42%)
     
  • DAX

    17,746.88
    -90.52 (-0.51%)
     
  • Hang Seng

    16,224.14
    -161.73 (-0.99%)
     
  • NIKKEI 225

    37,068.35
    -1,011.35 (-2.66%)
     

'Unfixable' flaw allows hackers into your computer

Thunderbolt cable and notebook computer.
Thunderbolt cable and notebook computer.

A very simple way to get around lockscreens and logins to modern computers has been found by a university researcher.

Thunderbolt ports, which were invented by Intel and have been installed into many Windows and Mac computers for the last decade, transfer data at very fast speeds.

But it does this by using a system called direct memory access, which Dutch masters student Björn Ruytenberg has shown can be hijacked without knowing the computer's login password.

Ruytenberg's method, called Thunderspy, even works for disks that are encrypted.

According to iTnews, the Thunderbolt vulnerability is not fixable as it requires hardware changes.

ADVERTISEMENT

Ruytenberg himself warns that the only way to avoid the hack is to keep computers physically secure.

Intel did release a feature called "kernel DMA protection" last year that partially protects against this hack. But the workaround slows down performance and stops some Thunderbolt accessories from working, which defeats the whole purpose of having these ports.

Moreover "kernel DMA protection" is only available on the most recent computers, with many 2019 models not covered.

The company itself recommended physically protecting computers from nefarious people.

"We encourage everyone to follow good security practices, including preventing unauthorized physical access to computers."

Sign up to the newsletter for exclusive access.
Sign up to the newsletter for exclusive access.

Follow Yahoo Finance Australia on Facebook, Twitter, Instagram and LinkedIn.