Can hardware & data files infect you?
What do you do if hidden hardware devices such as ones attached surreptitiously behind ATM machines, or algorithms embedded
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.