Compromised USB drives can be used to inject malicious code, redirect you to phishing websites, or give a hacker remote access to your computer.
Description & Disclaimer
Compromised USB drives can be used to inject malicious code, redirect you to phishing websites, or give a hacker remote access to your computer. In this video, an employee is faced with a decision that could ultimately decide the fate of his organization. Watch to find out what he does (or doesn’t do) to protect himself and what you can do to avoid being victimized by an uncanny social engineering attack.