CHAPTER

6

Pod Slurping

INFORMATION IN THIS CHAPTER

Attack of the Data Snatchers

Anatomy of a Slurp

Risky Business

Advancements in This Attack

Mitigating Measures

The technological dependence of our society is at an all-time high and continues to escalate at an alarming pace. Portable media devices are on the forefront of this movement, and mobile music players have historically been a driving force. Enhanced interfaces, enormous capacities, and decreasing form factors are some of the major motivators pushing this industry forward. Add a stiff shot of impulsive adolescence and a dash of hyped marketing, and you have the makings of a perfectly blended lucrative cocktail.

The iPod is just one example of a convenient contraption that can ...

Get Seven Deadliest USB Attacks now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.