253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Without Protection, Your USB Ports Could Become RIP Ports

Without Protection, Your USB Ports Could Become RIP Ports

It seems like everything available today can function with a USB connection, be it a thumb drive, device charger, or a desktop device--there are even USB-powered mini fridges meant for a single soda can. Unfortunately, “everything” includes malicious devices and malware.

If a USB drive is infected by malware, you can put your computer and data at risk by merely plugging it in, and there are some malicious USB devices out there that pose some pretty serious threats.

USB Kill 2.0 
Despite being powered by electricity, computers don’t mix well with too much charge, as USBKill.com has capitalized on. Creating a dongle that is capable of siphoning power off of the device it is plugged into, USBKill.com’s proprietary device then releases the energy back into the system as a power surge attack.

Intended for hardware developers to test their devices’ resistances against ‘juice jacking' (a form of data theft that extracts data as a device is charging), the USB Kill 2.0 permanently damaged--if not destroyed--95% of all devices it was tested with without the company’s proprietary USB protection shield. This shield is what allows the USB Kill 2.0 to be safely used for its intended purpose--to test electrical attack resistance.

What’s more, in some cases when used without the shield, the USB Kill 2.0 wipes data from the device. While this is not what the USB Kill 2.0 is intended to do, this occurs simply because the charge is enough to damage the device’s drive controllers.

Needless to say, a business saboteur could find great use in the $56 USB Kill 2.0 as a method of attack, and there aren’t many effective protections a workplace can implement, besides educating employees to resist the temptation of plugging in any USB device they find.

USB-to-Ethernet Theft
Best practices for workstation security dictate that a system be locked whenever its user steps away, no matter how briefly. However, a security researcher recently discovered a method of extracting data from a locked computer using, you guessed it, a USB-connected device. By disguising itself in a particular way, the target computer adopts the device as the preferred network interface, allowing the hacker to extract data to a rogue computer attached to the cable’s other end in about 13 seconds. The best defense, according to the researcher who uncovered this flaw: don’t leave your workstation logged in and unattended, even with the screen locked.

What a Business Can Do to Protect Itself
Of course, not all USBs are evil carriers of the worst malwares and threats, but by no means should they be used after being found on the street willy-nilly, especially in a workplace setting. In order to protect business workstations and data from threats, simply enforce a requirement to have any USBs fully checked by your IT department before in-office use. Alternatively, consider utilizing a cloud solution as a much safer option to meet your mobile storage needs.

To protect your business from possible saboteurs introducing their USB-based malware, it is also wise to secure exposed ports with locking devices.

While USB devices seem to be the pinnacle of affordable convenience in data storage, they are far more trouble than they are worth, at least in terms of security. There are much safer solutions to implement that feature equal, if not greater mobility than even a flash drive. A cloud solution, for instance, can be accessed from anywhere there is an Internet connection, kept safe in a well-protected, offsite location. New and improved solutions like these make risk-laden devices, such as USB dongles, unnecessary.

For more IT tips, tricks, and solutions, subscribe to our blog.

Tip of the Week: How to Clean Your PC Like an IT P...
These Innovative Technologies are Helping eBay Mov...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 19 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Cortana Business Continuity Relocation Cybercrime Malware Frequently Asked Questions Efficiency Managed IT Services Managed IT Services Passwords Emergency Facebook Mobile Devices Computer Care Managed IT Password Best Practices Smartphones IT Services Browser Multi-Factor Security Remote Monitoring Social Engineering Unsupported Software Data Backup Knowledge Wi-Fi Skype Title II Telephony Google Solid State Drive Save Money Update Files Millennials Hackers OneNote Microsoft IT Support Charger Virtualization Smartphone Business Credit Cards Excel iPhone Government Root Cause Analysis Data Storage Automation Google Drive Apple Computers Data Breach Hiring/Firing Data Recovery Flash End of Support Artificial Intelligence Privacy Communications IT Consultant Spam Blocking Upgrade Settings Amazon Web Services App Trending Employer-Employee Relationship Workforce Social Media Cast The Internet of Things Disaster Recovery Bring Your Own Device Humor Flexibility HaaS Cloud Computing Leadership Online Shopping How To Server Network Congestion Email BDR FCC Avoiding Downtime Holiday Law Enforcement Health Office 365 Money IT Management webinar Gadgets Android Innovation Public Cloud Hybrid Cloud Scam Quick Tips Workers Data loss Outsourced IT Samsung Word Security VoIP Computer Backup Supercomputer Meetings Internet Private Cloud Botnet Audit Productivity Recovery Hardware History Business Management Ransomware Screen Mirroring Router Spam Comparison Value Chrome Miscellaneous BYOD Specifications Budget Bandwidth Keyboard Tools Sync Windows 10 Netflix Downtime Telephone Systems Net Neutrality IT Plan FENG Windows 10s Apps Remote Work HBO Outlook Hosted Solutions Wireless Charging Safety Identity Theft Start Menu Voice over Internet Protocol Redundancy Small Business Data Network Operating System Technology Google Apps Computer Fan Two-factor Authentication Vulnerability Telecommuting Data Security Windows Business Computing Alert Cybersecurity Mobile Device Management Infrastructure Communication Website Current Events Collaboration Windows Server 2008 Internet Exlporer Productivity Windows 10 User Tips Windows 7 Phishing Online Evernote Software Tips Tip of the week Network Security Saving Money Amazon Advertising Tip of the Week Internet exploMicrosoft Google Docs Cloud Travel User Error Software

Newsletter Sign Up