+evil > USB_jacking
document updated 9 years ago, on Mar 12, 2015
USB has all kinds of vulnerabilities.

USB attacking the computer:

computer attacking the USB device:

The best way to secure USB is to cement over the USB ports. Alas, there's always a tradeoff between security and usability. ("the most secure computer is one that's in a locked room with all its cords removed — including the power cord")