Building Trojan Hardware at Home

Malware, Viruses and Trojan horse can destroy your computer and network; most of the time they are software based, but have you ever imagined that a hardware based trojan might also destroy or simply steal private information from your computer; consider a recent celebrity hack.

 
There are many tutorials, guide and codes are available online to program a Trojan horse but at the moment community is not focusing on hardware based Trojan, but you should focus. In this article, I will share a conspicuous presentation and video demonstration on "Building Trojan Hardware at Home" by JP Dunning, presented at BlactHat Asia 2014 event.