Device Hacking is a growing field. In this example, an iPhone is compromised by using a charger. Similar issues exist with USB.
What is to stop a very clever webstore from selling doctored USB hubs marketing to bitcoin users to attach or provide backdoor access to windows and linux mining systems. Now I sure it will get more complex, since simply changing the mining pool would get detected quickly but perhaps they could do something more clever.
http://www.dailytech.com/Hackers+Install+Malware+on+iPhone+With+Malicious+Charger/article31680.htmhttp://www.neowin.net/news/usb-flash-drive-hack-foiled-by-new-microsoft-security-patch Perhaps not required but why not be extra safe, Anyone do network isolation of their mining system at home?