searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

USB devices

Get our top stories in your inbox

USB storage devices: Convenient security nightmares

July 10, 2020

There’s no denying the convenience of USB media. From hard drives and flash drives to a wide range of other devices, they offer a fast, simple way to transport, share and …

New fuzzing tool for USB drivers uncovers bugs in Linux, macOS, Windows

May 28, 2020

With a new fuzzing tool created specifically for testing the security of USB drivers, researchers have discovered more than two dozen vulnerabilities in a variety of operating …

Majority of IT departments leave major holes in their USB drive security

October 9, 2019

For the second year in a row, the majority of employers are failing to equip their employees with the appropriate technologies, procedures and policies to ensure data security …

New user keystroke impersonation attack uses AI to evade detection

June 10, 2019

A sophisticated attack, called Malboard, in which a compromised USB keyboard automatically generates and sends malicious keystrokes that mimic the attacked user’s …

Employees are aware of USB drive security risks, but don’t follow best practices

May 15, 2019

Employees are aware of the risks associated with inadequate USB drive security – yet their employers aren’t mandating following best practices, according to a report by …

Main threat source to industrial computers? Mass-distributed malware

April 1, 2019

Malicious cyber activities on Industrial Control System (ICS) computers are considered an extremely dangerous threat as they could potentially cause material losses and …

Exposure of sensitive data via cloud applications and services increases 20%

February 22, 2019

To identify top threats, the Dtex researchers collected and analyzed information from work-issued endpoints across more than 300,000 user accounts. Proprietary, cloud and …

USB threat vector trends and implications for industrial operators

November 2, 2018

In an attempt to make industrial control systems less accessible to attackers, industrial players are limiting network access and increasingly using USB media devices to …

arrows

Risky business: 3 timeless approaches to reduce security risk in 2021

  • Security starts with architecture
  • Proliferation of sneakerbots across industries: The long tail of DIY bot operators
March 2021 Patch Tuesday forecast: Off to an early start

What's new

person

Credential exposure trends: You need a better password

arrows

Risky business: 3 timeless approaches to reduce security risk in 2021

patch

March 2021 Patch Tuesday forecast: Off to an early start

stock price

Cybercriminals increasingly impersonate business-related apps

Don't miss

patch

March 2021 Patch Tuesday forecast: Off to an early start

arrows

Risky business: 3 timeless approaches to reduce security risk in 2021

person

Credential exposure trends: You need a better password

stock price

Cybercriminals increasingly impersonate business-related apps

building

Security starts with architecture

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • The economics behind global disinformation engines and strategies for mitigation
  • How do I select a cloud security solution for my business?
  • Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations
  • How do I select a network monitoring solution for my business?

(IN)SECURE Magazine ISSUE 67 (November 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise