AD Banner

Featured

3/featured/recent

footer about

Videos

6/cate2/videos
Adv (300 x 250)

Find us on Facebook

5/cate3/lifestyle

Advertisement

6/breakingnews/random

Instagram posts

About us

3/cate1/entertainment

Recent Comments

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.
Copyright ©2019 by Mogtemplates

contact form

Name

Email *

Message *

Other News

[Related][recentmag]

EHI ONLINE LESSONS

EHI ONLINE LESSONS

Powered by Blogger.

Random Posts

World News

[World News][recentmag]
featured

Header Ads

Total Pageviews

Search This Blog

Blog Archive

Search This Blog

Latest

Brexit

Brexit

Football

Football

Random posts

5/cate4/random

Random Post

Adv (880 x 120)

News By Picture

pictures

Hot News

5/cate3/hottrend
Adv (880 x 120)

Labels

Hot News

[Hot News][recentmag]

Labels Cloud

Get In Touch
Footer Logo

Trending Posts Display

Labels List

Home Layout Display

Posts Title Display

Theme Layout

Theme Translation

Tech

tech

Games

games

Popular Posts

127 Likes
3,240 Followers
12.7k Subscribers
136 Followers

Pages

Recent Comments

How accessories make you a better lover. 18 ways devices are completely overrated. Operating systems in 12 easy steps.

Recent Posts

Adv (300 x 250)

Popular Posts

Trending Posts

How You Can Avoid a BadUSB Attack

By Ehijoshua (Jboss) → Sunday 5 October 2014

How You Can Avoid a BadUSB Attack


Usb_attack
Image: Getty Creative
Thanks to a couple of enterprising (or thoughtless) security experts and hackers presenting at Derbycon in Louisville, Kentucky, last week, BadUSB is now out in the wild — Or at least downloadable on GitHub. It's enough to make your stomach turn and certainly leave you wondering: How do I avoid BadUSB?
To know how to stop BadUSB, the seemingly unstoppable USB stick hack that can turn a USB memory stick into a system-lethal weapon, it's instructive to understand what it is and isn’t. BadUSB is not malware. It's not a file you can download from email or off an infected device that can then run rampant on your computer and network. BadUSB is, as the name suggests, a bad USB drive that has been altered to connect to a computer in ways that normal USBs do not.

If you plug such an altered USB into your computer it can, because it’s actually a tiny computer all by itself (as are all USBs), run commands, execute files and generally wreak havoc.

What can you do

While it's not easy to create these kinds of dangerous USB devices, it's also impossible for you to tell the difference between a regular USB and an altered one. Worse yet, since the files stored on the USB will not likely be infected, standard security software probably won't even detect that these are dangerous little pieces of hardware when you plug them into your computer.
We spoke to some security software firms about their best advice for avoiding BadUSB and their recommendations were remarkably analog.
Representatives from the Security Response team at Symantec, which makes the popular Norton family of security software products, acknowledged that traditional anti-virus technology can't "inspect the drivers running inside a USB device."
For consumers they recommend:
  • Only insert trusted USB devices into computers
  • Do not use or purchase pre-owned USB devices (they could potentially contain malicious software).
  • Never leave your computer or mobile devices unlocked or unattended.
Jillur Rahman

I'm Jillur Rahman. A full time web designer. I enjoy to make modern template. I love create blogger template and write about web design, blogger. Now I'm working with Themeforest. You can buy our templates from Themeforest.

No Comment to " How You Can Avoid a BadUSB Attack "