
0:00 Cybersecurity Expert Demonstrates How Hackers Easily Gain Access To Sensitive Information
0:50 How does the intruder USB cable work?
1:45 What is a keyboard emulator?
2:42 Building a USB keyboard emulator with Arduino
3:39 What's hidden inside the magic USB cable?
4:59 How to recognize a malicious USB cable?