That's an interesting attack vector, we will need to wait for the black hat presentation for details on how it works.
Easy way to be safe is not to plug into your computer whatever device you found around, its a common attack to leave malignant thumbdrives around a company you want to hack.
Using linux and a VM could help to contain the exploit.