All your base are belong to us

Excited news stories this morning about how your computer is vulnerable to attack from a phone plugged into your USB port made me chuckle. This “novel hack” involves making an Android phone mimic a USB keyboard in order to send keystrokes to the computer. Cool, but why¬†wouldn’t a hacker¬†just use a USB keyboard in the …

Continue reading ‘All your base are belong to us’ »