Quote Originally Posted by TFOGGER View Post
As long as a computer system is not air gapped and is connected to ANY outside network, it is vulnerable.
Air gaps are about as good as we can do, but you should see the (publicly published) proof of concept methods for remotely compromising air-gapped systems.