Blog Posts Tagged with "USB Drives"

86d8831c7ce6fcda920aac867a984d98

Ghost USB Honeypot: Interview with Project Leader Sebastian Poeplau

August 27, 2012 Added by:InfoSec Institute

Ghost is a honeypot for detecting malware that spreads via USB devices. It first tries to emulate a USB thumb drive. If the malware identifies it as a USB thumb drive, it will trick the malware into infecting it. Ghost then looks for write based requests on the drive, which is an indication of a malware...

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

Four Tips for Teaching Your Staff About Social Engineering

April 11, 2012 Added by:Brent Huston

Social engineering, the process of obtaining confidential information through tricking people to do things they should not do; is on the rise. So how can you help your staff recognize social engineering before it’s too late? Here are a few tips...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Twelve Security Best Practices for USB Drives

March 06, 2012 Added by:Kelly Colgan

Portable and mobile storage devices are significant players in most corporate offices. Ensuring proper protection with a best practices policy and strict enforcement offers significant risk reduction—and can prevent long nights on data breach investigations...

Comments  (1)

F29746c6cb299c1755e4087e6126a816

Twelve Security Best Practices for USB Drives

February 07, 2012 Added by:Kelly Colgan

Portable and mobile storage devices are significant players in most corporate offices. Ensuring proper protection with a best practices policy and strict enforcement offers significant risk reduction—and can prevent long nights on data breach investigations...

Comments  (1)

8c4834b99847b9f7c9ee94b45df086f9

The Importance of Software Updating

November 21, 2011 Added by:Emmett Jorgensen

There is software that can scan your network and check for these un-patched systems. The software can report back exactly which software updates are missing, and then use another tool to actually exploit those vulnerabilities. An attacker could take complete control of your computer...

Comments  (0)

34f0cf280cbc950bcb75cabd189b7a8d

Securing Flash Drives within the Enterprise

September 29, 2011 Added by:Kanguru Solutions

Flash drives have revolutionized the business world with their convenience and portability. However, for infosec professionals, flash drives are a dual edged sword. If lost or stolen, a single unencrypted flash drive has the potential to cause a costly data breach...

Comments  (1)

E973b16363b3de77b360563237df7e32

The Permanent Security Issue of Top Management

June 21, 2011 Added by:Bozidar Spirovski

No top manager wants to be bothered with the problems and challenges that security and IT guys are facing. Usually that means that the security request aspects of the solution have not been researched or even familiarized. All this results in a half-baked workaround solution...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

One in Three Employees Admit Taking Risks with Data

June 03, 2011 Added by:Headlines

"Businesses can make the mistake of viewing data security as an on-site issue. Often the risks can lie with physical loss or with personal computers. Firms should identify how their staff transfer and handle business documents outside of the work-place, and minimize the risks..."

Comments  (0)

8c4834b99847b9f7c9ee94b45df086f9

Eleven Questions to Ask When Buying a Secure Flash Drive

May 03, 2011 Added by:Emmett Jorgensen

USB flash drives are far too beneficial to be banned outright and avoided. Used with the correct combination of security features, they are a major asset to most organizations, providing a portable platform for storage and applications needed in today's corporate IT environments...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Dead Drop File Sharing Reminiscent of Cold War Espionage

April 19, 2011 Added by:Headlines

Dead Drops is an anonymous, offline, peer to peer file-sharing network in a public space. USB flash drives are embedded into walls, buildings and curbs. Everyone is invited to drop or find files on a dead drop. Plug your laptop to a wall, house or pole to share your favorite files and data...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Majority of Workers Plug Unknown USBs Into Office PCs

March 02, 2011 Added by:Headlines

“The Stuxnet worm, the first ‘industrial’ virus, was well-known for spreading via unsecure USB sticks. Furthermore, even if unprotected USB sticks are not infected with viruses or worms, they can contain sensitive corporate data, leaking important information to external organizations"...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Data Remains on USB and SSDs After Secure Erase

March 01, 2011 Added by:Dan Dieterle

New research shows that secure erase programs used on standard hard drives to wipe important data do not completely erase solid-state (SSD) drives and USB thumb drives. As much as 75 percent of the data could remain after a successful secure wipe...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

USB Device Containing Military Secrets Missing

January 05, 2011 Added by:Headlines

A removable USB storage device, alleged to contain classified level-two U.S. military secrets, is missing in South Korea. The unit was first reported missing in July, but the Army officer responsible for the hardware falsely reported that he had located and then discarded the device...

Comments  (0)