I plugged the Apple lightning cable into my iPod and connected it to my Mac, just as I normally would. My iPod started charging, iTunes detected the device, and my iPod produced the pop-up asking if I wanted to trust this computer. All expected behaviour. But this cable was hiding a secret. A short while later, a hacker remotely opened a terminal on my Mac’s screen, letting them run commands on my computer as they saw fit. This is because this wasn’t a regular cable. Instead, it had been modified to include an implant; extra components placed inside the cable letting the hacker remotely connect to the computer.