Weaponized USB devices as an attack vector
Trojanized HID devices as well as surveilling or malicious cables are serious threats that can be used to compromise even air-gapped systems.
5 articles
Trojanized HID devices as well as surveilling or malicious cables are serious threats that can be used to compromise even air-gapped systems.
Tips to protect your devices, your home network, and your privacy against cybercrime.
Any USB device can potentially be zombified and turned into a secret agent for cybercrooks. The world needed a shield against this threat, so we rolled up our sleeves and created one.
Charging your smartphone’s battery over USB can be dangerous: Thieves can steal your files, infect your smartphone with something nasty — or even brick it.
As an experienced Internet user, you know how to stay safe online by avoiding dangerous links, restricting children’s online activity, protecting sensitive data and performing quick on-site authorization. Still, threats