Discussion – 


Poison Tap

HerScreen Shot 2016-08-25 at 10.14.28 PMe’s how it works:
  1. The software runs off of a microSD card and it begins to send network traffic to Poison Tap, hijacking all network traffic.
  2. Stores cookies from the web browser of almost every website
  3. Poison Tap gains access to the computer’s internal router
The best way to protect your computer is to encrypt it and put it on sleep mode whenever you are leaving it unattended. You can also fill your USB ports with cement.

You May Also Like