Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Won’t Believe What Happens to a PC After Plugging in this USB Device!

You Won’t Believe What Happens to a PC After Plugging in this USB Device!

USB is a popular technology in all modes of today’s society. You’d be hard-pressed to find a modern piece of technology that’s not compatible in some way, shape or form with USB. Thumb drives, chargers, and even portable drives all use this common technology. However, this also means that hackers can take advantage of its popularity to spread malware and other problems.

If a USB device is infected with malware, it can put not just your computer, but even your entire data infrastructure at risk. We’ll discuss some of the many USB threats out there, including some that are more dangerous than you might think.

USB Kill 2.0
What happens when you push too much electricity into a device? It will experience a power surge, much like how a lightning storm could result in a power outage. Unfortunately, when used by hackers, this trait of electronics is a potent terror tactic. USB Kill is one particular threat that creates dongles designed to siphon power from a device, then release the energy back into the system to kill it. Scary indeed.

The device was originally intended to help hardware developers test the device’s ability to resist what’s referred to as “juice jacking.” Juice jacking is more easily described as the theft of data during the charging process. USB Kill 2.0 was capable of permanently damaging 95 percent of all devices that were tested.

USB Kill was frequently successful when attempting to wipe data from the device. Though this isn’t the designated purpose of USB Kill, it’s a side-effect that hackers have been able to leverage for their purposes--simply because the charge is enough to fry the drive controllers. Someone who wants to use this device can get it for as little as $56, which is further influenced by the fact that there aren’t effective protections against this type of threat. All you can really do is inform your employees that they shouldn’t be plugging in just any old USB device.

USB-to-Ethernet Theft
It’s a security best practice that you lock your device whenever you leave it unattended. It doesn’t matter if you’re leaving for the end of the day or taking a short stroll around the office--if you don’t lock your computer, it’s a security risk. Even if your device is locked, though, a security researcher created a way to extract data from a locked computer using a USB device. The USB device masks its malicious intentions by making the target PC adopt the device as the preferred network interface. This lets the hacker sap data out of the computer and send it to another connected system. In this particular case, it’s best to just not leave your computer unattended.

What’s a Business to Do?
Even though not all USB devices contain dangerous malware, it’s still not safe to just plug in any old device into your organization’s infrastructure. You can take a two-pronged approach to reinforce how your business handles USB devices:

  • First, educate your team on how to use them properly.
  • Second, enforce a policy that demands any and all devices be checked into IT and examined for threats before being plugged into your office’s technology.

Of course, if USB drives are a regular occurrence in your office, you can avoid this pain in the neck by implementing a cloud solution for your mobile storage needs. It’s also recommended that you secure any exposed ports with locks or similar devices.

In terms of security, while USB has been one of the most affordable and convenient ways to transfer data, it falls short of business-class standards. You should be looking to other solutions, like cloud computing, that can keep you connected to your data from anywhere at any time. A good cloud can offer you mobility and security, and in a world where data theft isn’t out of the question, you need all of the advantages that you can get.

To learn more about network security or cloud computing, reach out to us at (469) 567-0181.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 21 January 2019
If you'd like to register, please fill in the username, password and name fields.

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Computing Google Business Miscellaneous Windows 10 Workplace Tips Backup Efficiency Innovation Computer Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing User Tips Communication IT Support Business Management VoIP Server Network Smartphone Data Quick Tips Email Holiday Virtualization Save Money Going Green Remote Computing Business Continuity Mobile Device Management Operating System Social Media Upgrade Saving Money Office Apps Disaster Recovery Alert Chrome Small Business Android Antivirus The Internet of Things Big Data Managed Service Provider Application Microsoft Office Social Best Practice Facebook Mobility Employer-Employee Relationship WiFi Identity Theft Ransomware Lithium-ion battery Printer Information Technology Spam Bandwidth Unified Threat Management BYOD Hacking Tablet Law Enforcement Office Tips Passwords Password Analytics History Search Gmail Browser Saving Time Current Events Government User Error Hard Drives Maintenance Computers Disaster Recovery Fraud Network Security Wireless Automation Avoiding Downtime Phone System Router Apple Work/Life Balance Encryption Gadgets Smartphones Remote Monitoring Data Management Tech Support Money Users USB intranet Net Neutrality Firewall iPhone communications Collaboration Laptop Telephone Systems Streaming Media Humor Education Online Currency Point of Sale Benefits PowerPoint Personal Information Cost Management Retail BDR Entertainment Cybercrime Risk Management Managed IT Services Mobile Office Managing Stress Private Cloud Wireless Technology VPN Update Wi-Fi IT Solutions App Flexibility Budget Business Intelligence Transportation Outlook Shortcut IT Consultant Printer Server Fax Server Internet Exlporer Data Loss Biometrics Social Engineering Marketing Telephony Office 365 Customer Service Wearable Technology Administration Proactive IT Virtual Reality Content Filtering Google Drive DDoS Emails Audit Internet of Things Instant Messaging Bloatware IT consulting Applications Safety Twitter Artificial Intelligence OneNote Distributed Denial of Service Mouse Sports Battery Branding Touchpad Emergency OneDrive eWaste Network Congestion Bring Your Own Device Automobile RAM WIndows 7 Paperless Office Operating Sysytem Website Cleaning Ebay Workplace Television Storage Files Worker Commute Two-factor Authentication Bluetooth CPU Amazon Miscelllaneous Blogging Save Time Trending Video Games Chromecast Customer Relationship Management Hacker SharePoint Slow User Smart Phones HIPAA Travel Legal Excel Regulations Administrator Keyboard ISP Teamwork Best Available Reputation Windows 8 3D Printing Presentation Access Politics Hiring/Firing Meetings Vendor Management Hosted Solution Scalability Science Cameras Experience Running Cable Phishing Computing Data Theft End of Support How To Robot Music Networking Prodcuctivity CloudSync Advertising Online Backup Near Field Communication Data storage Books Human Resources Programming Compliance PDF Uninterrupted Power Supply Black Market Electronic Medical Records Inbound Marketing Text Messaging Display HaaS Computer Accessories

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code