. . . "Many readers were unaware that hardware, especially a mouse, could be used to deliver auto-launching exploit code." .