Blog Posts Tagged with "USB"

D03c28fd5a80c394905c980ee1ecdc88

Gaining Access to a Check Point Appliance

February 07, 2012 Added by:Bill Mathews

On any Linux-based system with an unencrypted hard drive, it is possible to completely overtake a system once you have gained physical access. Often this is easily accomplished with a live CD distribution, such as Backtrack or Ubuntu and some command line tools...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

On Software Vendor Access to Customer Data

January 30, 2012 Added by:Ben Kepes

The issue is a massive one for the industry and in a back-channel discussions a number of people made comments regarding how much of a risk to the cloud industry service provider access to data is. One person went on to say that this perception is poison to sales growth...

Comments  (0)

8c4834b99847b9f7c9ee94b45df086f9

The Future of Secure Mobile Computing?

May 27, 2011 Added by:Emmett Jorgensen

Using a Bare-Metal-Boot Mode, these devices never have to touch the hard drive of the host machine, and with capacities up to 128GB, there is plenty of room for data storage as well. Add to that encryption and dual factor authentication and you’ve got an incredibly secure device...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Learning USB Lessons the Hard Way

April 20, 2011 Added by:Brent Huston

Our inspection revealed a job in the scheduler set to kick off on Saturdays at 5am and launch this particular malware component which appeared to be designed to grab the cookies from the browser and some credentials from the system and users then throw them out to the host in China...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Attacking Computers and Smartphones via USB Cable

January 21, 2011 Added by:Headlines

Researchers have designed code which makes it possible to pilfer data when a smartphone is connected by USB cable with a computer. The code adds a mouse or keyboard function to the USB driver that allows the attacker to take control of the units and download files or upload malware...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

USB Attack Vectors Move Beyond Flash Drives

January 05, 2011 Added by:Dan Dieterle

The computer does not see the Teensy device as a USB drive or another accessory, but as a human interface device. With the Teensy programmable keystroke device, we are really looking at a new generation of intelligent malicious hardware that will be limited only by the imagination of the attacker...

Comments  (6)