summree
Hacked PC Hardware Hidden in Plain Sight!
Technology
Adam Savage’s Tested

Hacked PC Hardware Hidden in Plain Sight!

3 min read5 May 2026Worth watching
TL;DR
Adam Savage and Threat Locker cybersecurity experts demonstrate how ordinary-looking phone cables and keyboards can contain hidden Wi-Fi antennas and computers capable of logging keystrokes and hijacking webcams remotely. The video argues that assuming you will be compromised is smarter than hoping you won't be targeted, and explains why zero-trust security architecture is the only reliable defense.
Key points
1
The OMG cable looks identical to a standard phone charger but contains a hidden Wi-Fi antenna and mini-computer that can execute payloads and hijack webcams without any visible indicators
2
Compromised keyboards with built-in wireless antennas can transmit every keystroke to a threat actor sitting outside the building in real time
3
A Tesla employee was reportedly offered $500,000 to plug in a USB device, illustrating that high-value targets face sophisticated, well-funded physical attacks
4
Hospitals are especially high-risk targets because computers are left unattended, Bluetooth is pervasive, and they are more likely to pay ransoms due to sensitive patient data
5
Cyber crime cost an estimated $1.5 trillion and is rising annually; smaller businesses are increasingly targeted because they assume they are uninteresting to attackers
Actionable insights
Never plug your phone into someone else's cable or keyboard — treat your own cable as sacred and replace it immediately if it appears tampered with or unusually clean
Lock your personal credit report permanently and only unlock it when applying for credit, since personal data breaches are so widespread that exposure should be assumed
Restrict what software can do on your network — for example, blocking PowerShell from reaching the internet can render a delivered payload completely useless even after a breach occurs
Adopt a zero-trust mindset: require device-level validation in addition to passwords so stolen credentials alone cannot grant access to accounts or systems
Notable quotes

Your data is already gone. Don't worry about it. Like, just it's already been stolen. Everyone knows your medical records. Everyone knows your credit.

We have to assume everybody in the company is compromised. And there has to be a check and balance for what they do.

The first things they'll look at when they get in there is find the cyber insurance policy and find out how much you have in your bank account.

Worth watching?
Worth watching the full video?
Watch if you want to see the live demonstrations of the compromised cable and webcam hijack in action — the visual payoff is striking, though all the key technical details and takeaways are captured here.
Topics
TechnologyThreat Locker

Explore more summaries on these topics →

Saved you some time? The creator still deserves a like.

Watch on YouTube →
More like this

Get summaries like this for your own YouTube channels

Every new video from your channels — summarised and in your inbox before you even knew it dropped.

Try it free