gpsreqop.blogg.se

Secure thumb drive
Secure thumb drive




It's known as a Zero Day attack because the hacker has acted before the developer can act to fix the vulnerability. The most advanced attack by USB exploits a hole in computer software the vendor only knows about once the attack is discovered. When plugged into a computer, it injects keystrokes to command it, giving a hacker remote access to the victim's computer. In a more sophisticated attack, the device looks like a USB stick but will trick the computer into thinking a keyboard is attached. The file takes the thumb drive user to a phishing site, which tricks them into handing over their login credentials.

secure thumb drive

This unleashes a malicious code that automatically activates upon viewing and can download further malware from the Internet. In the most basic USB drop attacks, the user clicks on one of the files on the drive. A Good Samaritan hoping to return the drive or a penny pincher hoping to pocket a new device for free inserts the "found" drive into their computer's USB port. In a Universal Serial Bus (USB) drop attack, cybercriminals leave USB devices for people to find and plug into their computers.

secure thumb drive

But unfortunately, they are also loved by cybercriminals, who can use thumb drives to attack your computer. Whether a generic metallic memory stick, a branded giveaway at an event, or cleverly disguised as Yoda or some other pop culture icon, these devices are universally embraced as an easy way to transfer data. Thumb drives are used everywhere nowadays.






Secure thumb drive