Originally Posted by
gfunkdave
But how common are these "malware via USB charger" problems in the real world? It seems like something to be more concerned with if you're a government official or CEO.
I'm at a disadvantage as I'm stuck with my smartphone to reply, but if I want to attack, my target with a malware loaded USB device is not the CEO. It's the overworked technical engineer who is under appreciated... CEO doesn't have access to squat. But the L3 security engineer who has access to the entire client database?
If I want to hit a government official or corporate CEO, I would use a different attack method like a rogue Hotspot.