Get Help Now
    24/7 Support

    Types of USB Attacks

    USB was developed without taking into account the security of users. Windows, Linux and macOS trust any connected USB port. If the hacker has physical access to your computer, in this case the attack vector using USB becomes very dangerous.


    A group of researchers from the University of Ben-Gurion decided to analyze how many ways of abusing USB. 29 ways were determined by which attackers could use USB-devices to compromise users’ computers. These methods have been classified in four different categories, depending on how the attack is conducted in the course of work.

    You can find more information in Catalin Cimpanu’s article.

     

    More.



    DISCLAIMER: THIS POST IS FOR INFORMATIONAL PURPOSES ONLY AND IS NOT TO BE CONSIDERED LEGAL ADVICE ON ANY SUBJECT MATTER. DIGITAL FORENSICS CORP. IS NOT A LAWFIRM AND DOES NOT PROVIDE LEGAL ADVICE OR SERVICES. By viewing posts, the reader understands there is no attorney-client relationship, the post should not be used as a substitute for legal advice from a licensed professional attorney, and readers are urged to consult their own legal counsel on any specific legal questions concerning a specific situation.