As long as a computer system is not air gapped and is connected to ANY outside network, it is vulnerable.
Air gaps are about as good as we can do, but you should see the (publicly published) proof of concept methods for remotely compromising air-gapped systems.