Computer security systems become more sophisticated as the caliber of attacks evolves. Having all the possible barriers using antivirus and other security systems can stop an attack coming from the network. What happens when the threat comes in the form of a pen drive?

pen drive

A few months ago came the killer pendrive that when connected to the PC, completely disabled and forever. That device was commercially available and in fact was depleted. Now consultant and security expert Robert Fisk has devised in New Zealand a device that keeps at bay a real threat that the bulk of the users do not know: the attacks through the USB port. Do we know what exactly happens when we connect a pendrive to the computer? Who has developed the USB firmware we connected?

Fisk raises these and other questions in the introduction of USG a firewall that stops potential threats from devices that connect to that port. The USG is an additional pendrive that makes the filter that we are going to connect to the port, preventing access to the computer from modified versions of software or malware that can access through pen drives. Its creator insists on the importance of not relaxing by installing an antivirus on the computer: “It is almost impossible for the home user to maintain security on their computers by applying conventional media and software.

A manipulated USB can emulate a keyboard and enter commands to the computer in order to extract documents or introduce malware or introduce a virus that affects the system before it even starts to boot. The dimensions of such an attack can be unreasonable, such as the worm that was thus introduced in Iran’s nuclear power plants in 2010. In this sense, the USG offers sufficient guarantees to know that no malicious content will be introduced into our computer.

 

http://www.techasking.com/wp-content/uploads/2017/04/pen-drive.jpghttp://www.techasking.com/wp-content/uploads/2017/04/pen-drive-150x150.jpgJoshefElectronics & Gadgetssolar energy companies,usb antivirus
Computer security systems become more sophisticated as the caliber of attacks evolves. Having all the possible barriers using antivirus and other security systems can stop an attack coming from the network. What happens when the threat comes in the form of a pen drive? A few months ago came the...