Here is an introduction that I wrote about the class of attacks known as
"BadUSB" attacks.
Basically, an innocent USB charger can be turned into a ghost USB controller that can copy files, replace content, input commands as a keyboard etc... without the user noticing anything at all.