Tag Archives: usb

USB Killer… Now Publicly For Sale

It’s been some time since I last wrote about killing computers with a USB (here), and now the device is packaged nicely and available for the low price of approximately $55. Just a note to the general public here, if … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on USB Killer… Now Publicly For Sale

Did you hear about the FDIC data breach?

Thanks to DLP (data loss prevention) software, the FDIC caught 44,000 customer records getting copied to a USB drive on an employee’s last day of work. She legitimately used the customer records normally as part of her day-to-day and while … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Did you hear about the FDIC data breach?

USB Compromise Reveals 22,000 ISIS Identities

A man who names himself Abu Hamed has defected from ISIS and he plausibly stole a USB stick from ISIS security headquarters that contained recruiting questionnaires. The information in the questionnaires contained name, date and place of birth, hometown, telephone … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on USB Compromise Reveals 22,000 ISIS Identities

USB Killer… 2.0!

Do you remember, back in March, when I wrote about using a USB key that could fry a computer and actually make it catch on fire? Well, it’s been improved upon, version 2.0 was created. It works super fast as … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on USB Killer… 2.0!

USBKill Switch Engaged

USBKill is a kill-switch that waits for a change on your USB ports (such as removing the usb) and then immediately shuts down your computer and is available on GitHub. USBKill should be paired with full disk encryption for maximum … Continue reading

Posted in Security Blog | Tagged , | Comments Off on USBKill Switch Engaged

A USB to Destroy a Computer

A blog writer named Dark Purple wrote an article on a proof of concept called USB Killer, a USB that when plugged into a computer, would charge, then discharge back into the computer, to fry circuits and burn half the computer … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on A USB to Destroy a Computer

Beware Used or Discount Devices

Because of the introduction of BadUSB, some cybercriminals have been modifying hardware peripherals with some extra storage, some wireless and remote connectivity, and a lot of quality hacker ingenuity. Keyboard with a hardware keylogger built into it This type of … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on Beware Used or Discount Devices

Chinese Made eCigarette USB Malware Phones Home

It was found that some Chinese made eCigarettes and their USB charging cables, have been made with malware built right in. When plugged into a computer, it phoned home. Is this a true story or a hoax? Hard to tell … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Chinese Made eCigarette USB Malware Phones Home

Jim Miklaszewski

Saw this meme on Imgur. Is it just a meme? Did this happen? I don’t know.

Posted in Security Blog | Tagged , , , , | Comments Off on Jim Miklaszewski