USB security vulnerability



Just read this over at eweek…. USB devices can post a security risk.

There’s an “age old” adage in computer security (well – as far as computer security it’s old…) You can control a machine if you have physical access to it. This is yet another example. Essentially it sounds as though an attacker can gain administrative access by inserting a specially “programmed” usb key which can cause a buffer overflow in the USB device driver.

From the article “demonstrating a USB storage device that is programmed to automatically copy recently accessed files when inserted into a Windows PC.” This could be very bad news in certain environments. No need to site trying to break into the system, just plug it in and the recently access files are copied over. This is “hollywood movie style hacking/cracking” it wouldn’t seem to get much easier.

If you’re concerned about this kind of data theft, there are options though. Devicelock is one. Safend’s USB port protector is another. It is still worth making sure to restrict unauthorized access to “valuable”, data rich machines. Products like Devicelock and Safend’s protectors can slow down and make more complicated data theft, or tampering with a system, but it cannot be prevented. Give an individual enough time with physical access to a machine and they will get in.

Related Posts

Blog Traffic Exchange Related Posts
  • How to Remove Windows Smart Security (Removal Guide) Windows Smart Security is a rogue spyware application that may fool people into installing and purchasing due to the use of the words Windows and Security in the title. It may fool people into thinking that it is related to Microsoft Windows and perhaps even a part of the operating......
  • How to Remove SystemVeteran | Removal Guide SystemVeteran is (yet another) variation from the wini family of rogue antivirus applications. Their last one prior to this was BlockProtector (BlockProtector Removal Guide) but it is a VERY long lived family and they are churning out one variation every two to three days. Most of these have the same......
  • Network Security guide for the home or small business network - Part 7 - Wireless Networking OK - the last couple of entries got into some heavy lifting and some real learning on your part. Learning about what software needs to run, what services are running, updating them to keep current on security patches. We even talked about securing services listening for outside connections and limiting......
Blog Traffic Exchange Related Websites
  • D-Link Announced 2 new 2-Bay Network Storage Devices Two new Network Storage Devices from D-Link D-Link today announced that its ShareCenter® 2-Bay Network Storage devices, the DNS-320 and DNS-325, are now available. Building off of the successful DNS-321 and DNS-323, the new DNS-320 and DNS-325 provide centralized storage, enabling consumers to easily share documents, files and digital media......
  • Hard Drive Data Recovery And Benefits Of Saving Files A hard drive data recovery is utilized to get back the important files from a corrupt or defective hard drive. The most usual issue that this occurs is when the computer is freezing up and becomes not responsive, sometimes the system is restarting continuously or the system is shutting......
  • Managed Cloud Hosting - How It Takes Stress From Your Business Learning about how managed dedicated server hosting takes pressure off of many business functions, will help companies to take advantage of its inexpensiveness, availability, and security. With managed hosting, businesses get the redundancy and the cost benefits of the public cloud, while also enjoying the security and availability of the......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site