Wednesday, October 01, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
ZOTAC Injects Palm-Sized ZBOX nano XS with Double Dose of Performance
Corsair Releases The Flash Voyager Vega Flash Drive
Mozilla Unveils Firefox-powered Matchstick Streaming Adapter
New ARM Solutions Reduce Time to Market for FinFET Designs
LG 34-inch Curved Monitor Now Available
Comcast Offers Cloud TV In San Franscisco
AMD Demonstrates Network Function Virtualization Solution on 64-Bit Embedded R-Series SoC
Apple To Release New "Gold" iPad Air: report
Active Discussions
Yamaha CRW-F1UX
help questions structure DVDR
Made video, won't play back easily
Questions durability monitor LCD
Questions fungus CD/DVD Media, Some expert engineer in optical media can help me?
CD, DVD and Blu-ray burning for Android in development
IBM supercharges Power servers with graphics chips
Werner Vogels: four cloud computing trends for 2014
 Home > News > General Computing > Hackers...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, July 31, 2014
Hackers Can Use USB Devices in Attacks


USB devices such as keyboards can be used to hack into PCs, German crypto specialist and and chief scientist with Berlin's SR Labs Karsten Nohl revealed on Thursday.

Nohl said that that hackers could load malicious software onto the chipsets that control functions of USB devices. Such small are everywhere and have no built-in shields against tampering with their code.

"You cannot tell where the virus came from. It is almost like a magic trick," said Nohl.

Nohl performed attacks by writing malicious code onto USB control chips used in thumb drives and smartphones. Once the USB device is attached to a computer, the malicious software can log keystrokes, spy on communications and destroy data, he said.

In his tests, Nohl said he was able to gain remote access to a computer by having the USB instruct the computer to download a malicious program with instructions that the PC believed were coming from a keyboard. He was also able to change the DNS network settings on a computer.

Most seriously, anti-virus software cannot detect such infections as they are only designed to scan for software written onto memory and do not scan the low-level code of the USB devices (firmware.)

However, it is generally hard to rewrite a firmware for a device without having access to confidential information related to that "inner" code.

Nohl will describe their attack method at next week's Black Hat hacking conference in Las Vegas.



Previous
Next
U.S. Government Issues Warning About Malicious Software        All News        Next Apple TV Release Delayed
U.S. Government Issues Warning About Malicious Software     General Computing News      Next Apple TV Release Delayed

Get RSS feed Easy Print E-Mail this Message

Related News
Hackers Exploit 'Shellshock' Cyber Thread
JPMorgan Servers Hacked in June
Health Data Stolen in Cyber Attack from China
Hackers Stole Over 1 Billion Records
U.S. Arrests Russian Accused Of Hacking Retail Systems
Montana State Says 1.3 Million Records Exposed in Data Breach
Hackers Used YouTube To Sell Stolen Credit Card Data
Hackers Attack Dominos Pizza, Steal Customers' Data
Iranian Hackers Use Fake Social Media Accounts To Spy
Spotify's Servers Hacked
AVAST Forum Hacked
eBay Asks Users To Change Passwords

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .