+evil > USB_jacking

USB has all kinds of vulnerabilities.

USB attacking the computer:

computer attacking the USB device:

The best way to secure USB is to cement over the USB ports. Alas, there's always a tradeoff between security and usability. ("the most secure computer is one that's in a locked room with all its cords removed — including the power cord")