Articles about usb

Intel's super-secret Management Engine firmware now glimpsed, fingered via USB

Positive Technologies, which in September said it has a way to drill into Intel's secretive Management Engine technology buried deep in its chipsets, has dropped more details on how it pulled off the infiltration. The biz has already promised to demonstrate a so-called God-mode hack this December, saying they've found a way …
Linux penguin canape... snacks. Photo by SHutterstock

Don't worry about those 40 Linux USB security holes. That's not a typo

The Linux kernel USB subsystem has more holes than a donut shop. On Monday, Google security researcher Andrey Konovalov disclosed 14 Linux USB flaws found using syzkaller, a kernel fuzzing tool developed by another Google software engineer, Dmitry Vyukov. That's just the tip of the iceberg. In an email to The Register, …

Infosec eggheads rig USB desk lamp to leak passwords via Bluetooth

Malicious USB gadgets can secretly spy on data flowing in and out of devices plugged into adjacent USB ports, security researchers in Australia have warned. For example, keypresses from a USB keyboard could be read by a specially modified thumb drive placed in the next-door port. The spy stick can pick up electrical signals …
Iain Thomson, 11 Aug 2017
Tommy Lee Jones delivers implied facepalm. From No Country for Old Men  Copyright Miramax Pictures. 2007.

Blue Cross? Blue crass: Health insurer thought it would be a great idea to mail plans on USB sticks

A US health insurer is taking heat for its decision to mail USB drives containing coverage information to businesses that offer its plans to employees. Alabama-based developer Thomas Gamble said he received a mailer from Blue Cross and Blue Shield of Alabama that included a USB key, along with instructions to insert the gadget …
Shaun Nichols, 12 Jul 2017
Mickey Mouse

HP Inc wireless mouse can be spoofed

If you're using an HP Inc wireless keyboard/mouse combo and the cursor starts behaving badly, someone might be pranking you. That's because the wireless mouse in the ERK-321A bundle is unencrypted: anyone can sniff its signals, learn its protocol and commands, and inject their own signal in a spoofing attack. German …
Hammer, spanner and screw

'Jarvis' brings AI to the Linux command line, without Iron Man

Repo Roundup Welcome again to Repo Roundup, in which The Reg trawls online code repositories to let you know about the fun, the useful or the inexplicable. This week, let's start with DevSkim from Microsoft, which quietly landed in public preview in mid-December. DevSkim's aim is to help developers spot code errors that could be a …

Spoof an Ethernet adapter on USB, and you can sniff credentials from locked laptops

Security consultant and blogger Rob Fuller has turned a USB SoC-based device into a credential-sniffer that works even on locked machines. Fuller's attack works by modifying the dongle; when it's plugged in, it installs and makes itself the victim's network gateway, DNS server, and WPAD (Web proxy autodiscovery protocol) …
bee

USBee stings air-gapped PCs: Wirelessly leak secrets with a file write

Video Mordechai Guri, the Israeli researcher who has something of a knack for extracting information from air-gapped PCs, has done it again – this time using radio frequency transmissions from USB 2 connections. Dubbed USBee, the technique turns a computer's USB ports into mini RF transmitters by modulating the data fed at high …
Iain Thomson, 31 Aug 2016
Angus Young of AC/DC

Thunder struck: Apple kills off display line

Apple has ended production of its line of Thunderbolt monitors. The Cupertino idiot tax racket says that it will no longer be making the display available after its current stock is sold out in Apple stores and online. Apple debuted the Thunderbolt display in 2011, pushing the screen as a reason for users to adopt its new …
Shaun Nichols, 24 Jun 2016

Websites take control of USB devices: Googlers propose WebUSB API

Two Google engineers have drafted a software interface that allows websites to control USB devices. Reilly Grant and Ken Rockot say their proposed WebUSB API allows hardware developers to configure and control USB devices from webpages, simplifying the process of installing and setting up equipment. "Today when you connect a …
Shaun Nichols, 11 Apr 2016
Picard frustrated

Half of people plug in USB drives they find in the parking lot

A new study has found that almost half the people who pick up a USB stick they happen across in a parking lot plug said drives into their PCs. Researchers from Google, the University of Illinois Urbana-Champaign, and the University of Michigan, spread 297 USB drives around the Urbana-Champaign campus. They found that 48 …
Shaun Nichols, 11 Apr 2016
Claw hammer

If you want a USB thumb drive wiped, try asking an arts student for help

Art students – or at least those at the University of Northern Iowa – are the most likely to know how to permanently delete data from USB drives, while business or humanities students don't even try. That's one amusing conclusion of a serious study, led by the US university's Sarah Diesburg, into how people treat the security …
OnePlus 2 backs

Mobe-maker OnePlus 'fesses up to flouting USB-C spec

In early November Google chap Benson Leung caused a stir when he wrote an analysis suggesting manufacturers of cables and power adapters weren't paying attention to the USB Type-C spec. Manufacturers' inattention, he worried, might result in devices being damaged as they suck down too much power. Leung's concerns appear to …
Simon Sharwood, 27 Nov 2015

Google engineer names and shames dodgy USB Type-C cable makers

A Google engineer says some discount USB Type-C converter cables are substandard and could cause damage by drawing too much juice. One of the big advantages of the USB Type-C design is never again having to guess which way up the plug has to be to fit in its hole; the other advantage is power transmission. A Type-C 1.1 laptop …
Iain Thomson, 5 Nov 2015
Internet of Cats feeder

The USB Lego, bluetooth coffee cups and connected cats of Computex 2015

Taiwan's technology industry likes to position the annual Computex expo as the week in which it shows off its ingenuity to the world. This year's show might just have shown that Taiwan - and the rest of us - are in a bit of a rut. Last year, I couldn't move at Computex without stumbling over a booth offering a zillion …
usb_type_c_648

One USB plug to rule them all? That's sensible, but no...

Comment It’s only taken thirty years, but we’ll soon have one plug that, on paper, does it all: power, video and all kinds of peripherals. Cue headlines about “one cable to rule them all”. And it’s reversible! However, “soon” isn’t “now”. It’s going to be a confusing and expensive journey before the promises are fulfilled. The last …
Lightning

Intel adopts 40Gb per SECOND USB-C plug for Thunderbolt 3.0

Computex 2015 Intel's sort of given up on the Thunderbolt interface - but it's also found a way to help increase its relevance by making it a superset of USB 3.1. Thunderbolt has always been fast, and has the nifty trick of connecting peripherals, carrying data and bringing video to monitors over a single cable — but it never took off. …
USB bomb

Forget viruses: Evil USB drive 'fries laptops with a power surge'

Security experts have been warning for years about the dangers of USB sticks as a conduit for malware, but a Russian researcher has bragged about coming up with a more direct method for borking a computer – with old-fashioned electricity. The idea is cunningly simple but fiendish, and reminds us of the Etherkiller: the …
Iain Thomson, 12 Mar 2015

Create a news alert about usb, or find more stories about usb.

Biting the hand that feeds IT © 1998–2017