T2 security chip vulnerability can allow hackers to control Apple desktops, laptops
This means core operating system functions can be modified, while encrypted data can be collected or have malware planted for various uses.