This is a dedicated watch page for a single video.
During a routine security audit, a consultant finds an unauthorized device that, when plugged into a computer, executes software mimicking a network update request. What kind of social engineering method is this?