Why it matters: Exploiting USB devices and the protocol itself has become far too easy in recent years. Widespread availability of inexpensive malicious hardware has lead many to simply disable unused ...