Sort:  

Although these two storage devices are new attack vectors for a hacker to take.