How to turn a phone into a covert bugging device? Infect the printer James Bond-style attack underscores growing vulnerability of embedded software. Click to view the original at arstechnica.com