2010年8月13日星期五

IT risks rise of USB drive iped

IT risks rise of USB drive iped

Theft of data, a large number of relatively small USB memory has been made

industry adhere to a strong security threat ubiquitous device. However, the flash drives to store and automatically run applications directly off the phone,womens evening dresses, which may give them greater protection capacity of headache.

The danger is not to be overlooked information technology expertise.

USB thumb drives And his company has deployed the tools to prevent these new problems.

Demonstrate the potential risks, Hak.5,blackberry case, a security-related white hat hacker claims run podcast last month, shows how a USB memory stick can be divided into a device to install backdoor software that automatically retrieves the password or grab, and turned the product code.

\

The Hak.5 participate in the protest, a Redwood City, Calif. company U3, you can let the software directly from the USB drive the implementation of relatively new technologies. With the traditional USB flash drives, U3 memory stick and running since the start can be automatically inserted into the system there is a CD – ROM to the computer application.

U3’s technology can increase a user, so he and his program storage,mobiles phones, password and other personal data of the memory stick on the desktop mobility,cable to hdmi, and then use any computer without worry about whether to install them these applications. This is one of the new set of suppliers such as

However, the mobile end-users of such malicious hackers to compromise systems approach another Royal, John Pescatore said Gartner Inc. analyst

For example, Hak.5 have been developed and released the payload, so that people can use the U3 thumb drive to automatically retrieve the Windows password hash, the browser history and AOL Instant Messenger and MSN password. Currently, they are only when the user computer in which the USB device into full administrative privileges. But a split in the works, can be automatically upgraded to U3 drive through user privileges. Another theft of a computer to be cracked any USB key into the machine then deposit code by e-mail message data to another location.

apad

this Thursday, Hak.5 podcasts to its latest USB hack refine, Kitchen said.

Companies need to seriously think about USB storage device management, said Jonathan Singer, a research firm Yankee Group analyst in Boston.

Anderson said that those concerned with health, to encourage the installation of SecureWave SA Lincoln, allowing administrators to manage the USB drive to use computer software. SecureWave’s products to prevent Lincoln Health System to connect to multiple types of USB devices. IT can also monitor and audit local, allows end users to connect USB devices, where the system activities.

Fabi Gower, vice president in the IT Martin, Fletcher, Irving, Texas health care company, has deployed a similar technology from SecureWave. She said she has reason to believe that it should be protected against threats, such as with the U3 flash drive. SecureWave provides a way to implement the standard USB device that, she said.

In a sense, is not a new threat, 韦斯利麦克 Grew Robert said that in the Mississippi State University Starkville students in computer security research. For example, can be installed in the mobile system through the CD – ROM, malicious code has been in existence for several years,hdmi cables, he said. What makes the threat of U3 risk, although the fact that the device can retrieve and store data, he said in.

相关的主题文章:

没有评论:

发表评论