TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Of Mice and Compromised Keyboards...Malware Goes Peripheral

22 pointsby privacygurualmost 14 years ago

3 comments

swolchokalmost 14 years ago
There was malicious firmware for Apple keyboards back in 2009 -- <a href="http://www.blackhat.com/presentations/bh-usa-09/CHEN/BHUSA09-Chen-RevAppleFirm-SLIDES.pdf" rel="nofollow">http://www.blackhat.com/presentations/bh-usa-09/CHEN/BHUSA09...</a>
hfulleralmost 14 years ago
Teensy is "a USB drive whose malicious software waits until the victims' computer is booted and sufficiently logged into a computer network before it begins operation"? Bad journalism... Teensy is only a microcontroller...
sp332almost 14 years ago
How can you use Metasploit to exploit an "undocumented vulnerability"?<p>Also, if you'd like to make your own, Hak5 forums have a parts list <a href="http://forums.hak5.org/index.php?showtopic=16236" rel="nofollow">http://forums.hak5.org/index.php?showtopic=16236</a> and lots of project ideas for it <a href="http://forums.hak5.org/index.php?showforum=56" rel="nofollow">http://forums.hak5.org/index.php?showforum=56</a><p>edit: removed useless video link