2014-08-10 6:02 [Photo: istockphoto]
A typical example is an invisible keyboard. When the USB device is connected to the computer, the keyboard itself began to write the command. As a result, computer cheated pulled from the internet malicious program.
connected via USB to your smartphone pretended network card, which allowed for stealing login and password for one of the online services.
When the hacker conference Black Hat in Las Vegas, Karsten Nohl Berlin expert left no doubt:
No comments:
Post a Comment