Security researchers Karsten Nohl and Jakob Lell believe USB sticks are fundamentally insecure. To prove this, they developed a malware program called BadUSB: which has the ability to take over PCs, redirect Internet traffic and more. According to Nohl: “These problems can’t be patched. We’re exploiting the very way that USB is designed.”
If USB is fundamentally flawed, what can enterprises do to protect themselves?
Listen to our latest security slice podcast and hear Lamar Bailey, Craig Young and Lane Thames discuss the use of USB devices by security researchers and why USB wasn’t designed to include authentication.
CLICK HERE TO LISTEN TO THE PODCAST
- Security Slice: Tearing Up Tor
- Security Slice: Security Up For Ransom
- Security Slice: CISPA 2.0?
- Security Slice: DEF CON Sneak Peek: Pineapple Abductions
Check out Tripwire SecureScan™, a free, cloud-based vulnerability management service for up to 100 Internet Protocol (IP) addresses on internal networks. This new tool makes vulnerability management easily accessible to small and medium-sized businesses that may not have the resources for enterprise-grade security technology – and it detects the Heartbleed vulnerability.
The Executive’s Guide to the Top 20 Critical Security Controls
Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].
Title image courtesy of ShutterStock