Defending Linux workstations against USB attacks

Introduction USB attacks involve the use of malicious [...]