Hello, Carlos! The mobile and physical vulnerabilities you mentioned are quite interesting. Your example with hardware backdoors in devices really shows the importance of buying from trusted vendors and viewing the behavior of devices. The USB attack you mentioned can be especially dangerous when the device automatically opens the USB that is plugged in. That is why sometimes this automation should be turned off, especially when many people will have access to the device. Great work this course.
SUPPORT
Please Note:
The support ticket system is for technical questions and post-sale issues.