Researchers show how simply connecting to a rogue machine can silently compromise the host. …read more

Source:: DarkReading