Think of the possibilities: From the other side of the room-or of the planet-a hacker can: grab your passwords, steal your files, implant a persistent rootkit, or move laterally onto your corporate network. What looks like a regular phone cable actually pretends to be a keyboard that an attacker can remote-control. A security researcher miniaturized a malicious Wi-Fi microcontroller inside the tiny housing of a USB connector.