There was malicious firmware for Apple keyboards back in 2009 -- <a href="http://www.blackhat.com/presentations/bh-usa-09/CHEN/BHUSA09-Chen-RevAppleFirm-SLIDES.pdf" rel="nofollow">http://www.blackhat.com/presentations/bh-usa-09/CHEN/BHUSA09...</a>
Teensy is "a USB drive whose malicious software waits until the victims' computer is booted and sufficiently logged into a computer network before it begins operation"? Bad journalism... Teensy is only a microcontroller...
How can you use Metasploit to exploit an "undocumented vulnerability"?<p>Also, if you'd like to make your own, Hak5 forums have a parts list <a href="http://forums.hak5.org/index.php?showtopic=16236" rel="nofollow">http://forums.hak5.org/index.php?showtopic=16236</a> and lots of project ideas for it <a href="http://forums.hak5.org/index.php?showforum=56" rel="nofollow">http://forums.hak5.org/index.php?showforum=56</a><p>edit: removed useless video link