Enter multiple symbols separated by commas

» more from Investigations Inc.: Cyber Espionage

USB Key Malware

Malware can also get onto a computer through a USB key. For instance, someone can slide infected USB keys into packets given out at a conference, Alperovitch said. Once the unsuspecting person plugs the key into his or her machine, malware is installed. It can also be surreptitiously inserted into a computer by a spy on the inside of a company.

Jeffrey Hamilton | Digital Vision | Getty Images