Attackers with physical access to targeted machines could exploit these flaws to access and copy data within minutes, researchers say. …read more

Source:: DarkReading