ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

USBFuzz: Forscher spürten 26 USB-Treiber-Bugs in mehreren Betriebssystemen auf | #CyberSecurity

USBFuzz: Forscher spürten 26 USB-Treiber-Bugs in mehreren Betriebssystemen auf | #CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it

Mittels automatisierter Tests, so genanntem Fuzzing, haben Sicherheitsforscher insgesamt 26 Programmierfehler in USB-Treibern entdeckt. 18 davon betreffen verschiedene Linux-Kernelversionen; wiederum zehn dieser Linux-Bugs erhielten aufgrund von ihnen ausgehender hoher Sicherheitsrisiken CVE-Nummern. Vier weitere Bugs betreffen Windows 8 und 10, drei stecken in macOS 10.15 Catalina und einer im freien BSD-Derivat FreeBSD 12.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=USB

 

Gust MEES's insight:

Mittels automatisierter Tests, so genanntem Fuzzing, haben Sicherheitsforscher insgesamt 26 Programmierfehler in USB-Treibern entdeckt. 18 davon betreffen verschiedene Linux-Kernelversionen; wiederum zehn dieser Linux-Bugs erhielten aufgrund von ihnen ausgehender hoher Sicherheitsrisiken CVE-Nummern. Vier weitere Bugs betreffen Windows 8 und 10, drei stecken in macOS 10.15 Catalina und einer im freien BSD-Derivat FreeBSD 12.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=USB

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Officials warn about the dangers of using public USB charging stations | #CyberSecurity #JuiceJacking

Officials warn about the dangers of using public USB charging stations | #CyberSecurity #JuiceJacking | ICT Security-Sécurité PC et Internet | Scoop.it

Travelers are advised to avoid using public USB power charging stations in airports, hotels, and other locations because they may contain dangerous malware, the Los Angeles District Attorney said in a security alert published last week.

USB connections were designed to work as both data and power transfer mediums, with no strict barrier between the two. As smartphones became more popular in the past decade, security researchers figured out they could abuse USB connections that a user might think was only transferring electrical power to hide and deliver secret data payloads.

This type of attack received its own name, as "juice jacking."

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=USB

 

Gust MEES's insight:

Travelers are advised to avoid using public USB power charging stations in airports, hotels, and other locations because they may contain dangerous malware, the Los Angeles District Attorney said in a security alert published last week.

USB connections were designed to work as both data and power transfer mediums, with no strict barrier between the two. As smartphones became more popular in the past decade, security researchers figured out they could abuse USB connections that a user might think was only transferring electrical power to hide and deliver secret data payloads.

This type of attack received its own name, as "juice jacking."

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=USB

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

A USB dongle can hijack all your Web accounts and router in 30 seconds, even if your computer is locked

A USB dongle can hijack all your Web accounts and router in 30 seconds, even if your computer is locked | ICT Security-Sécurité PC et Internet | Scoop.it
A proof of concept from security researcher and software developer Samy Kamkar shows that macOS, Windows, and Linux computers can have any previously active Web logins hijacked merely by plugging in a tiny Unix device via USB or Thunderbolt, even if the computer is locked and password protected, and possibly even when it seems to be asleep. It can also hijack many router brands on the same network.

PoisonTap exploits several interlocked network and browser design features, rather than relying on an operating system, hardware, or browser flaw. This will make it harder to root out and resolve. Kamkar said in an interview, “The interesting attacks to me are by design: how do you exploit the protocol rather than a single buffer overflow that gets patched the next day.”

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Samy+KAMKAR

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Raspberry+PI

 

Gust MEES's insight:
A proof of concept from security researcher and software developer Samy Kamkar shows that macOS, Windows, and Linux computers can have any previously active Web logins hijacked merely by plugging in a tiny Unix device via USB or Thunderbolt, even if the computer is locked and password protected, and possibly even when it seems to be asleep. It can also hijack many router brands on the same network.

PoisonTap exploits several interlocked network and browser design features, rather than relying on an operating system, hardware, or browser flaw. This will make it harder to root out and resolve. Kamkar said in an interview, “The interesting attacks to me are by design: how do you exploit the protocol rather than a single buffer overflow that gets patched the next day.”

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Samy+KAMKAR

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Raspberry+PI

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Warum Sie niemals ein fremdes Kabel zum Smartphone-Laden nutzen sollten | #Awareness #CyberSecurity #Smartphones

Warum Sie niemals ein fremdes Kabel zum Smartphone-Laden nutzen sollten | #Awareness #CyberSecurity #Smartphones | ICT Security-Sécurité PC et Internet | Scoop.it

Praktisch, wenn man unterwegs ein USB-Kabel zum Aufladen des Smartphones findet. Allerdings sollte man sein Telefon nicht an jedes beliebige Kabel hängen. Über präparierte Ladestationen können Unbefugte in den Besitz persönlicher Daten gelangen.
Smartphones an öffentlich zugänglichen USB-Steckern aufzuladen, kann ein Sicherheitsrisiko sein. Zum Schutz vor Spionage sollte man lieber auf eigene Kabel und Ladegeräte zurückgreifen, rät der Sicherheitsexperte Brian Krebs in seinem Blog „ krebsonsecurity.com“.
Er warnt vor dem sogenannten Video Jacking. Dabei wird über vermeintliche Ladestationen der Displayinhalt des Smartphones übertragen. Angreifer können so Sicherheitscodes, Passwörter und Texteingaben auslesen und verfolgen, was auf dem Smartphonebildschirm angezeigt wird.
Nehmen Sie ihr eigenes Kabel mit!!!


Betroffen sind Geräte, an deren Micro-USB-Port auch der formgleiche Mobile High Definition Link (MHL) oder ein Slimport-HDMI-Adapter angeschlossen werden kann. Diese Stecker ermöglichen auch die Übertragung des Bildschirminhalts vieler Android- und Blackberry-Smartphones. Für das ungeübte Auge sind sie von normalen Micro-USB-Steckern nicht zu unterscheiden - den Akku des Smartphones laden sie alle. Mit einem speziellen Adapter funktioniert der Angriff den Angaben nach auch mit Apples iPhone 6.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Video+Jacking

 

Gust MEES's insight:

Praktisch, wenn man unterwegs ein USB-Kabel zum Aufladen des Smartphones findet. Allerdings sollte man sein Telefon nicht an jedes beliebige Kabel hängen. Über präparierte Ladestationen können Unbefugte in den Besitz persönlicher Daten gelangen.
Smartphones an öffentlich zugänglichen USB-Steckern aufzuladen, kann ein Sicherheitsrisiko sein. Zum Schutz vor Spionage sollte man lieber auf eigene Kabel und Ladegeräte zurückgreifen, rät der Sicherheitsexperte Brian Krebs in seinem Blog „ krebsonsecurity.com“.
Er warnt vor dem sogenannten Video Jacking. Dabei wird über vermeintliche Ladestationen der Displayinhalt des Smartphones übertragen. Angreifer können so Sicherheitscodes, Passwörter und Texteingaben auslesen und verfolgen, was auf dem Smartphonebildschirm angezeigt wird.
Nehmen Sie ihr eigenes Kabel mit
Betroffen sind Geräte, an deren Micro-USB-Port auch der formgleiche Mobile High Definition Link (MHL) oder ein Slimport-HDMI-Adapter angeschlossen werden kann. Diese Stecker ermöglichen auch die Übertragung des Bildschirminhalts vieler Android- und Blackberry-Smartphones. Für das ungeübte Auge sind sie von normalen Micro-USB-Steckern nicht zu unterscheiden - den Akku des Smartphones laden sie alle. Mit einem speziellen Adapter funktioniert der Angriff den Angaben nach auch mit Apples iPhone 6.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Video+Jacking

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

ALERT!!! Dateiendung .zcrypt: Microsoft warnt vor wurmartigem Erpressungstrojaner | #Ransomware #CyberSecurity

ALERT!!! Dateiendung .zcrypt: Microsoft warnt vor wurmartigem Erpressungstrojaner | #Ransomware #CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Die Ransomware ZCryptor verbreitet sich von System zu System, in dem der Trojaner sich im Autostart von USB-Sticks einnistet. Sie verschlüsselt über 80 verschiedene Dateitypen.

Microsoft warnt Nutzer vor einem neu entdeckten Erpressungstrojaner namens ZCryptor. Der Schädling verhält sich eigentlich wie viele andere Ransomware-Programme, hat aber die besonders perfide Eigenheit, sich auch auf eingesteckte USB-Laufwerke und -Sticks zu kopieren. In dem sich ZCryptor in die Autostart-Datei der Laufwerke einklinkt, verbreitet er sich wurmartig von System zu System.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/ict-security-tools/?tag=Ransomware

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

Gust MEES's insight:
Die Ransomware ZCryptor verbreitet sich von System zu System, in dem der Trojaner sich im Autostart von USB-Sticks einnistet. Sie verschlüsselt über 80 verschiedene Dateitypen.

Microsoft warnt Nutzer vor einem neu entdeckten Erpressungstrojaner namens ZCryptor. Der Schädling verhält sich eigentlich wie viele andere Ransomware-Programme, hat aber die besonders perfide Eigenheit, sich auch auf eingesteckte USB-Laufwerke und -Sticks zu kopieren. In dem sich ZCryptor in die Autostart-Datei der Laufwerke einklinkt, verbreitet er sich wurmartig von System zu System.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/ict-security-tools/?tag=Ransomware

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

USB: Schadcode auf der ISS, Stuxnet im Atomkraftwerk

USB: Schadcode auf der ISS, Stuxnet im Atomkraftwerk | ICT Security-Sécurité PC et Internet | Scoop.it
Viren kommen über das Internet auf Computer. Das ist die landläufige Meinung. Der russische Sicherheitsexperte Jewgeni Kasperski kennt dagegen zwei Beispiele für Infektionen an Offlinesystemen.
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/05/17/ideas-for-a-more-secure-internet-part3dangers-of-storage-devices/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=USB

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

USB Hygiene

USB Hygiene | ICT Security-Sécurité PC et Internet | Scoop.it
By this point you should be fairly well aware of the threats facing you when browsing the Internet on your digital devices. From phishing scams in your inbox to malicious banner links, surfing the ...
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://www.scoop.it/t/ict-security-tools/?tag=USB

 

http://www.scoop.it/t/ict-security-tools/?tag=USB-Security

 

http://gustmees.wordpress.com/2012/05/17/ideas-for-a-more-secure-internet-part3dangers-of-storage-devices/

 

Scooped by Gust MEES
Scoop.it!

Report 78 of IT security pros admit plugging in found USB drives

Report 78 of IT security pros admit plugging in found USB drives | ICT Security-Sécurité PC et Internet | Scoop.it
Even IT security professionals are clearly ignoring basic security rules, a new survey found.
Gust MEES's insight:

 

Check also:

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Security App of the Week: Bitdefender USB Immunizer

Security App of the Week: Bitdefender USB Immunizer | ICT Security-Sécurité PC et Internet | Scoop.it
Security App of the Week: Bitdefender USB Immunizer...

 

The infamous AutorunInf Trojan and the Conficker worm are threats that show up in most of the quarterly or yearly reports released by security solutions providers and it’s well known that one of their favorite ways of spreading is via USB storage devices utilized by computer users to transfer data from one machine to the other.

 

Bitdefender comes to the aid of individuals who rely on USB memory sticks, SD cards, and portable hard drives in their daily activities, with the USB Immunizer.

 

The free utility’s main purpose is to mitigate threats designed to step into play as soon as the storage unit on which they're hosted is plugged in.

 

Read more and download it:

http://news.softpedia.com/news/Security-App-of-the-Week-Bitdefender-USB-Immunizer-273095.shtml?utm_source=twitter&utm_medium=twitter&utm_campaign=twitter_web

 

 

See also:

http://www.scoop.it/t/ict-security-tools?q=usb+immunizer

 

 

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Documentation, Tice & cie... - L'usage risqué des clés USB

Documentation, Tice & cie... - L'usage risqué des clés USB | ICT Security-Sécurité PC et Internet | Scoop.it
Le bulletin "SÉCURITÉ de l'information" , publié par le CNRS en mars 2011 (n°11), consacre son ultime numéro aux risques des clés USB et aborde la question de leur chiffrement.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Des chercheurs découvrent 26 bugs USB dans Linux, Windows, MacOS et FreeBSD | #CyberSecurity

Des chercheurs découvrent 26 bugs USB dans Linux, Windows, MacOS et FreeBSD | #CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it

Des universitaires disent avoir découvert 26 nouvelles vulnérabilités dans la pile de clés USB utilisée par les systèmes d'exploitation tels que Linux, macOs, Windows et FreeBSD. L'équipe de recherche, composée de Hui Peng de l'Université de Purdue et de Mathias Payer de l'Ecole polytechnique fédérale de Lausanne, a déclaré que tous les bugs ont été découverts grâce à un nouvel outil qu'ils ont créé, appelé USBFuzz.

Cet outil est ce que les experts en sécurité appellent un fuzzer. Les fuzzers sont des applications qui permettent aux chercheurs en sécurité d'envoyer de grandes quantités de données non valides, inattendues ou aléatoires comme entrées dans d'autres programmes. Les chercheurs en sécurité analysent ensuite le comportement des logiciels testés pour découvrir de nouvelles vulnérabilités, dont certaines peuvent être exploitées de manière malveillante.

Pour tester les clés USB, Hui Peng et Mathias Payer ont développé USBFuzz, un nouveau fuzzer spécialement conçu pour tester la pile de clés USB des systèmes d'exploitation modernes. « En son cœur, USBFuzz utilise un dispositif USB émulé par logiciel pour fournir des données aléatoires aux pilotes (lorsqu'ils effectuent des opérations d'entrée/sortie) », ont déclaré les chercheurs. « Comme le dispositif USB émulé fonctionne au niveau du dispositif, le portage sur d'autres plateformes est simple ».

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=USB

 

Gust MEES's insight:

Des universitaires disent avoir découvert 26 nouvelles vulnérabilités dans la pile de clés USB utilisée par les systèmes d'exploitation tels que Linux, macOs, Windows et FreeBSD. L'équipe de recherche, composée de Hui Peng de l'Université de Purdue et de Mathias Payer de l'Ecole polytechnique fédérale de Lausanne, a déclaré que tous les bugs ont été découverts grâce à un nouvel outil qu'ils ont créé, appelé USBFuzz.

Cet outil est ce que les experts en sécurité appellent un fuzzer. Les fuzzers sont des applications qui permettent aux chercheurs en sécurité d'envoyer de grandes quantités de données non valides, inattendues ou aléatoires comme entrées dans d'autres programmes. Les chercheurs en sécurité analysent ensuite le comportement des logiciels testés pour découvrir de nouvelles vulnérabilités, dont certaines peuvent être exploitées de manière malveillante.

Pour tester les clés USB, Hui Peng et Mathias Payer ont développé USBFuzz, un nouveau fuzzer spécialement conçu pour tester la pile de clés USB des systèmes d'exploitation modernes. « En son cœur, USBFuzz utilise un dispositif USB émulé par logiciel pour fournir des données aléatoires aux pilotes (lorsqu'ils effectuent des opérations d'entrée/sortie) », ont déclaré les chercheurs. « Comme le dispositif USB émulé fonctionne au niveau du dispositif, le portage sur d'autres plateformes est simple ».

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=USB

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Logitech wireless USB dongles vulnerable to new hijacking flaws | #CyberSecurity 

Logitech wireless USB dongles vulnerable to new hijacking flaws | #CyberSecurity  | ICT Security-Sécurité PC et Internet | Scoop.it

Vulnerabilities found in Logitech's proprietary Unifying USB dongle technology.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=USB

 

Gust MEES's insight:

Vulnerabilities found in Logitech's proprietary Unifying USB dongle technology.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=USB

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

This $5 device can hack password-protected computers in just 30 seconds | #CyberSecurity #Awareness

This $5 device can hack password-protected computers in just 30 seconds | #CyberSecurity #Awareness | ICT Security-Sécurité PC et Internet | Scoop.it
Even the strongest passwords are fallible, and as Samy Kamkar demonstrates, sometimes it doesn’t take much. Kamkar’s new exploit, PoisonTap, uses free software and a $5 Raspberry Pi Zero microcomputer. After attaching the Raspberry Pi to a USB adapter and plugging it in, the device goes to work. In all of 30 seconds, it bypasses your …

 

 

Gust MEES's insight:
Even the strongest passwords are fallible, and as Samy Kamkar demonstrates, sometimes it doesn’t take much. Kamkar’s new exploit, PoisonTap, uses free software and a $5 Raspberry Pi Zero microcomputer. After attaching the Raspberry Pi to a USB adapter and plugging it in, the device goes to work. In all of 30 seconds, it bypasses your …

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Road Warriors: Beware of ‘Video Jacking’ | #CyberSecurity #Cyberespionage #Awareness #digcit

Road Warriors: Beware of ‘Video Jacking’ | #CyberSecurity #Cyberespionage #Awareness #digcit | ICT Security-Sécurité PC et Internet | Scoop.it
A little-known feature of many modern smartphones is their ability to duplicate video on the device’s screen so that it also shows up on a much larger display — like a TV. However, new research shows that this feature may quietly expose users to a simple and cheap new form of digital eavesdropping.

Dubbed “video jacking” by its masterminds, the attack uses custom electronics hidden inside what appears to be a USB charging station. As soon as you connect a vulnerable phone to the appropriate USB charging cord, the spy machine splits the phone’s video display and records a video of everything you tap, type or view on it as long as it’s plugged in — including PINs, passwords, account numbers, emails, texts, pictures and videos.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=USB

 

Gust MEES's insight:
A little-known feature of many modern smartphones is their ability to duplicate video on the device’s screen so that it also shows up on a much larger display — like a TV. However, new research shows that this feature may quietly expose users to a simple and cheap new form of digital eavesdropping.

Dubbed “video jacking” by its masterminds, the attack uses custom electronics hidden inside what appears to be a USB charging station. As soon as you connect a vulnerable phone to the appropriate USB charging cord, the spy machine splits the phone’s video display and records a video of everything you tap, type or view on it as long as it’s plugged in — including PINs, passwords, account numbers, emails, texts, pictures and videos.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=USB

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Ecigarette from China distributes malware to systems

Ecigarette from China distributes malware to systems | ICT Security-Sécurité PC et Internet | Scoop.it
An executives system was reportedly infected by malware after he charged an ecigarette purchased on eBay through his systems USB port.
Gust MEES's insight:

An executives system was reportedly infected by malware after he charged an ecigarette purchased on eBay through his systems USB port.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Danger USB! Malware infects UN Nuclear Agency computers

Danger USB! Malware infects UN Nuclear Agency computers | ICT Security-Sécurité PC et Internet | Scoop.it
An internal investigation has discovered that some of the computers at the International Atomic Energy Agency (IAEA) headquarters in Vienna have been infected for months with data-stealing malware.
Gust MEES's insight:

 

The big questions that remain unanswered are this – who was behind the attack, and what happened to the sensitive data that the malware scooped up?


Learn more:


http://www.scoop.it/t/securite-pc-et-internet?q=USB



No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

USB flash drives masquerading as keyboards mean more BYOD security headaches

USB flash drives masquerading as keyboards mean more BYOD security headaches | ICT Security-Sécurité PC et Internet | Scoop.it

 

 

Hackers have come up with an ingenious way to bypass the Microsoft's AutoRun protection measures present on Windows 7 and Windows 8 by making the flash drive pretend it's a keyboard.

 

 

 

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Gust MEES's insight:

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Gust MEES's curator insight, July 30, 2013 4:45 PM

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Scooped by Gust MEES
Scoop.it!

Mobile workspace offers a secure Windows OS on any computer

Mobile workspace offers a secure Windows OS on any computer | ICT Security-Sécurité PC et Internet | Scoop.it

Mobile workspace offers a secure Windows OS on any computer

 

Imation announced Stealth Zone 2.1 boot-from-USB secure mobile workspace. This new version enhances data security by making it easier and more convenient for business travelers, teleworkers and contractors to carry a secure, managed Microsoft Windows 7 operating system and an encrypted data transfer solution on a single, fully managed USB device.

 

Read more:

http://www.net-security.org/secworld.php?id=13082&amp;utm_source=dlvr.it&amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Lost USB keys have 66% chance of malware | Naked Security

Lost USB keys have 66% chance of malware | Naked Security | ICT Security-Sécurité PC et Internet | Scoop.it
We bought a stash of USB keys at a major transit authority's Lost Property auction, and took a look at the sort of information people leave on the train.

 

We didn't find any OS X malware. But nine of the keys appeared to belong to Macintosh owners (or at least had been used extensively on Macs); seven of these were infected.

 

GM: Read more, very interesting...

No comment yet.