PS5 details: Is there a risk that hackers will exploit them?
inet infosec

PS5 details: Is there a risk that hackers will exploit them?

Sony's game developer and creator, Mark Cerny, gave some details about the new PS5 console. In one...
Read More
infosec

Cisco warns of vulnerabilities in 9000 series routers

Cisco has released 31 security tips this week, but has focused users on "critical" patches for ...
Read More
infosec

HP: Adds the Sure Sense malware blocker to its new devices

HP announced a series of updates and new features for PCs, as well as the official HP release ...
Read More
infosec

Covering vacancies in hacker security

Incidents of online attacks are increasing day by day. Previously no such attention was paid. After the incident with the ...
Read More
infosec

Oracle: New Critical Patch Update fixes 297 vulnerabilities

Oracle releases a collection of patches for multiple critical security vulnerabilities. The update contains 297 new security fixes ...
Read More
Latest Posts

How easy are USB cables to import malware?

USBA researcher from SYON Security managed to create a modified USB charging cable that would allow hackers to transfer malicious programs to your computer without noticing it. Below this practice lies the famous BadUSB vulnerability.

Back to Black Hat Conference 2014, Encryption Specialists Karsten Nohl and Jakob Lell they entered in the world the concept of BadUSB - a security flaw that allowed attackers to turn a USB into a keyboard, typing malicious commands through it.

With the USBHarpoon title, the cable is based on an alternate chip and a different firmware. The charging cable can also be used with many smartphones and other devices.

According to the German news site WinFuture, once the infected USB cable is connected via HID, the offender can send malicious code to the computer, such as Trojans or other viruses. The site reports that Windows, Linux and Mac are equally vulnerable to this attack.

Previously, the USB cable has stopped charging when applying BadUSB, which could put the victim in suspicion.

Vincent Yiu and his research team are working on a way to trigger the attack while the victim is away from the device.

While BadUSB is gradually climbing as one of the main cyber attacks, people are also discovering the corresponding firewalls to deal with these new types of attacks.

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *