Latest: Download Free Desktop Wallpapers of Chef Loony! | Series: AuthorRank? | Download MBT eBooks!

How You Can Avoid a BadUSB Attack

0 Comments

How You Can Avoid a BadUSB Attack


Usb_attack
Image: Getty Creative
Thanks to a couple of enterprising (or thoughtless) security experts and hackers presenting at Derbycon in Louisville, Kentucky, last week, BadUSB is now out in the wild — Or at least downloadable on GitHub. It's enough to make your stomach turn and certainly leave you wondering: How do I avoid BadUSB?
To know how to stop BadUSB, the seemingly unstoppable USB stick hack that can turn a USB memory stick into a system-lethal weapon, it's instructive to understand what it is and isn’t. BadUSB is not malware. It's not a file you can download from email or off an infected device that can then run rampant on your computer and network. BadUSB is, as the name suggests, a bad USB drive that has been altered to connect to a computer in ways that normal USBs do not.

If you plug such an altered USB into your computer it can, because it’s actually a tiny computer all by itself (as are all USBs), run commands, execute files and generally wreak havoc.

What can you do

While it's not easy to create these kinds of dangerous USB devices, it's also impossible for you to tell the difference between a regular USB and an altered one. Worse yet, since the files stored on the USB will not likely be infected, standard security software probably won't even detect that these are dangerous little pieces of hardware when you plug them into your computer.
We spoke to some security software firms about their best advice for avoiding BadUSB and their recommendations were remarkably analog.
Representatives from the Security Response team at Symantec, which makes the popular Norton family of security software products, acknowledged that traditional anti-virus technology can't "inspect the drivers running inside a USB device."
For consumers they recommend:
  • Only insert trusted USB devices into computers
  • Do not use or purchase pre-owned USB devices (they could potentially contain malicious software).
  • Never leave your computer or mobile devices unlocked or unattended.

No comments:

ehijoshua2 at facebook

"""""""Sponsored Post"""""""

>>>>>>>Sponsor your post to appear here above all post>>>>>>> Click here

We provide the cheapest bulk sms service & We offer you best Rynga credit

We provide the cheapest bulk sms service & We offer you best Rynga credit
We provide the cheapest bulk sms service & We offer you best Rynga credit at the best prices you can find in Nigeria. In today's fast pace environment, our most expensive asset is time.

Submit Guest Post

Submit Guest Post
Hello we are EJTB we accept sponsored post www.ehijoshuatechblog.com
  • MBT Icons and buttons

    Icons and Buttons

    Our resources have been successfully downloaded over 10K times and found almost every where. Get yours!

  • choosing webhost for a blog

    Why HostGator?

    Learn Why we chose HostGator as our Web Host and find discount coupons to kick start your blog today!

  • SEO Settings for blogger

    ALL IN ONE SEO PACK 2012

    Learn every single SEO tip that will boost your blog's ranking and organic traffic. We got them all!

  • Blogger widgets and plugins

    Visit MBT's Blogger LAB

    Why not take a tour of all great Blogger widgets published so far? You Name it we have it!

  • become a six figure blogger!

    Become a SIX FIGURE BLOGGER

    Learn what it takes to become a successful entrepreneur and build a living online!