Earlier this year, a PoC malware that could infect Apple Macs through a Thunderbolt accessory was introduced. The sequel to the “Thunderstrike“ exploit doesn’t need physical access and can now be delivered online—just like PC threats.
What will the threat landscape look like in the next two years? How will it evolve? The "FuTuRology" project attempts to answer these questions in a series of articles that covers the future of threats to different industries.