Mike Grover, a security researcher, has modified an Apple cable to include a module that can hack into a Mac or PC. Integrated into the USB socket, which normally recharges and transfers all data, this device also allows remote control of the computer connected to the object. From the outside, this device called “O.M.G Cable” is physically indistinguishable from an original Apple Lightning cable. It is only by disassembling the USB plug that one could eventually realize that it includes a very small printed circuit board for malicious use. It therefore allows a motivated attacker to connect remotely from this cable, and to send “HID” commands (for “Human Interface Device”) to simulate the action of a keyboard or mouse. And take control of the computer to which it is attached. This gives him the ability to search the files as he wishes, or to execute specific commands remotely. The hacker even created an iOS mobile application to send these commands. Obviously, this control only works if the computer is unlocked. However, the cable makes it relatively easy to prevent automatic locking after a certain period of time. If the target leaves its workstation, it is then enough to artificially simulate some mouse movements. In the medium term, Mike Grover said he wanted to produce a limited series of these false cables, and to sell them to interested parties. This has become a reality, since this fake charging cable will now be marketed on a very large scale. It should cost about $100 a piece. Because the cable looks exactly like a real Apple one, the only way to not be fooled ultimately falls on common sense: it is very logical to use only products certified by the firm rather than alternative low-cost products whose security is very uncertain… It is also an opportunity to remind us that connecting a suspicious USB key to your computer, a cable found opportunely in the street or using a makeshift loan to help yourself is never a good idea in these times of hyper connectivity… The devil is always hiding in the details, he waits for you at the bend of each synchronization connection, which also makes him potentially very dangerous.