Friday, October 09, 2015
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Apple Removes Apps From Online Store
PC Shipments Kept Falling In 3Q
Apple Says Battery Tests For iPhone 6s Lineup May Be Misleading
Qualcomm Showcases 24-core Server Chip
AT&T Customers Allowed To Make Calls Over Wi-Fi
Amazon Launches App Developing Platform For IoT
18.4-inch Samsung Galaxy View Tablet Passes FCC Certification
Facebook to Test Emoji Icons
Active Discussions
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
How to burn a backup copy of The Frozen Throne
Help make DVDInfoPro better with dvdinfomantis!!!
Copied dvd's say blank in computer only
menu making
Optiarc AD-7260S review
 Home > News > General Computing > Hackers...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, July 31, 2014
Hackers Can Use USB Devices in Attacks

USB devices such as keyboards can be used to hack into PCs, German crypto specialist and and chief scientist with Berlin's SR Labs Karsten Nohl revealed on Thursday.

Nohl said that that hackers could load malicious software onto the chipsets that control functions of USB devices. Such small are everywhere and have no built-in shields against tampering with their code.

"You cannot tell where the virus came from. It is almost like a magic trick," said Nohl.

Nohl performed attacks by writing malicious code onto USB control chips used in thumb drives and smartphones. Once the USB device is attached to a computer, the malicious software can log keystrokes, spy on communications and destroy data, he said.

In his tests, Nohl said he was able to gain remote access to a computer by having the USB instruct the computer to download a malicious program with instructions that the PC believed were coming from a keyboard. He was also able to change the DNS network settings on a computer.

Most seriously, anti-virus software cannot detect such infections as they are only designed to scan for software written onto memory and do not scan the low-level code of the USB devices (firmware.)

However, it is generally hard to rewrite a firmware for a device without having access to confidential information related to that "inner" code.

Nohl will describe their attack method at next week's Black Hat hacking conference in Las Vegas.

U.S. Government Issues Warning About Malicious Software        All News        Next Apple TV Release Delayed
U.S. Government Issues Warning About Malicious Software     General Computing News      Next Apple TV Release Delayed

Get RSS feed Easy Print E-Mail this Message

Related News
T-Mobile Customers Exposed in Experian Breach
Cisco Routers Vulnerable To Attack: researchers
Hackers Stole Data From Bugzilla
American Airlines, Sabre, Hacked
Researchers Showcase Javascript-based Attack On a Computer's DRAM
Hackers Used Twitter hashtags To Extract Data From Compromised Networks
Hackers Could Break Into Your Android Smartphone With A Simple MMS
Government Personnel Data Hack Exposed Of Millions Of People
Kaspersky Lab Was Hacked
Russian Hackers Accessed Obama's Emails
The White House Targets Cyber Attackers With New Sanctions Program
GitHub Under Denial-of-service cyber Attack

Most Popular News
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .