. "Hackers can do something more nefarious, such as pretend to be a keyboard and inject keystrokes that log the hacker in." . . .