E-cigs are currently caught in the middle of a health debate, as numerous studies have argued that they are either better or worse than traditional tobacco cigarettes – but experts have yet to come to a conclusion.
You could be a very scary person if you wanted to be.[emoji3]jkDefinitely plausible. Tons of things have been weaponized to gain access to company networks. My favorite is a Nexus 6 cell phone that contains the standard compliment of penetration testing software.
Want an even easier way to gain access to a network? Drop off a basket of weaponized flash sticks with a company logo in the reception area. Yep, employees will snag them all and one of the first things they do when they get to their desk is plug it into the computer.
There are even weaponized power strips with USB ports for charging. Set one up at a public location and drop your payload on countless devices.
I'd be more worried about payloads designed to turn your e-cig into a device that's unsafe to use. It's one of the primary reasons why we do not allow individuals to upload firmware updates directly to ECF or link them to sites like Google drive. It would be far too easy for a bad actor to modify a firmware update to do terrible things to your e-cig.
You could be a very scary person if you wanted to be.[emoji3]jk
You are absolutely right about the flash drive bit. Candy for kids. I would probably be the person who picks up five of them and give them away to friends.
Once you add BT or Wifi to a mod you're no longer swimming in the kiddy pool.
Put tape over the webcam on the laptop and put the cell in the microwave. (Sorry, just watched Snowden)
Sent from tomorrow
The whole tape over the webcam thing is a load of bull crap. You still have the microphone and the led is hardwired to come on when ever the camera receives voltage. So if somebody is spying on you you'll know because the led will be on. BT is pretty dang secure on a modern os/firmware. Wifi is very secure as long as you're using wpa 2 and have a strong password.
Sorry, not true. They've figured out how to modify the camera's firmware years ago and can routinely use the built in camera on notebooks (as well as web cams that use Realtech drivers) without the LED coming on. In some cases, it's a simple matter of a registry edit.
I've had that virus before btw.
Any modern computer will not have autorun from USB enabled. So you can't run programs just by plugging it in. Keyboard control would be noticed. I've written USB HID (Human Interface Device) software on PIC18F platform before. It's pretty limited what you could do with that, keyboard/mouse/joystick.
I supposed you could do, start ->run -> some website, then click enter to install some bad software. But really, modern OS's are pretty decent about stuff like that. The timing would have to be perfect too, since it can't read the screen. It's a one way, send only keyboard/mouse type thing.
Even the example program just started notepad and put up some words. That's very easy to do if you have the tools of the platform and can get people to install the firmware (which usually isn't that easy for newbs).

Somebody please send me a tinfoil hat......I am not very talented at making things.........![]()
Occam's Razor.No need for a hat, just cover your roof in it.[emoji6]
Sent from tomorrow
Any modern computer will not have autorun from USB enabled. So you can't run programs just by plugging it in. Keyboard control would be noticed. I've written USB HID (Human Interface Device) software on PIC18F platform before. It's pretty limited what you could do with that, keyboard/mouse/joystick.