![]() ![]() Instead of making a USB-connected smartphone appear to a host computer as a phone, make it appear to be a mouse or a keyboard-and then use that mouse or keyboard to take control of the computer. ![]() A pair of researchers presenting at the Black Hat DC conference are showing off an amusing new attack against laptops and smartphones that is initiated simply by plugging the phone into the PC.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |