How to know if a USB cable is hiding malicious hacker hardware