and last year's of videos. We saw what USB drop tax are and why they were so effective.
And these series of videos will be digging a little deeper and seeing what different types of us be. Drop tax There are.
So first we'll look at the USB human interface device moving attack these air devices that emulate keyboards. The second type attack is a malicious file slash code attack, and these thieves use everyday flash drives.
Next, we'll be looking at social sharing link attack, and these can use every day flash drives or
H i D devices. So we'll take a look. That one, uh, the next one will be us be killed devices these air rather nasty on. I'll show you why in a moment
the last one is thes zero day attack that uses zero day vulnerabilities already, So let's get into it.