Sneaking spyware in to plant on your computers?
Sneaking company secrets out from their computers?
Recording your private meetings?
Whatever the goal, drive-by spy devices are becoming harder to catch; especially USB drives.
Here is a quick update so you will know it when you see it.
from the seller's website...
Surveillance style pen containing a micro sized video camcorder with 4 GB of memory. Get the mission completed with this awesome secret agent DV pen, often called a "spy pen" in the trade.
Sitting in your shirt pocket, standing in the pen cup or lying on the desk, no-one will ever notice as you secretly capture their every move. The built in flash stores the video until it is ready to be downloaded to a computer via USB, and with 4GB's of memory you can record hours of surveillance or interviews in between trips back to the office. (more with video)
All metal cross shaped necklace containing an 8 GB USB flash drive.
These days a USB flash drive is as necessary as your house keys. Whether you are taking large work files back and forth from the office or are sharing pictures and music with friends, nothing beats the convenience of a USB thumb drive. Well, why not make sure yours fits the person you are? This is a elegant all-metal cross that has a built in 8GB's of memory so you should have space to keep in its heart. (more)
All metal heart shaped necklace containing an 8 GB USB flash drive.
These days a USB flash drive is as necessary as your house keys. Whether you are taking large work files back and forth from the office or are sharing pictures and music with friends, nothing beats the convenience of a USB storage drive. Well, why not make sure the one you get fits the person who is going to carry it? This is an elegant all-metal and jeweled heart necklace that has a built in 8GB's of memory so you or your loved one will have enough space to keep those treasured memories close at heart. (more)
Realistic looking watermelon containing 8GB of USB flash memory. If you want more than to just plug your old fashioned USB stock in, this novelty USB memory stick that is right up your alley. Just remove the tip to reveal the USB connection, and watch people gape at your one of a kind computer accessory. (more)
Showing posts sorted by relevance for query usb. Sort by date Show all posts
Showing posts sorted by relevance for query usb. Sort by date Show all posts
Wednesday, February 18, 2009
Tuesday, December 6, 2011
Security Director Alert: USB Trouble Sticks
• Memory sticks given as gifts or promotional items may contain spy software (possibly unbeknownst to the giver).
• “Found on the ground” USB sticks are risky. They may have been planted for you to find. Never plug one into a computer to see what is on it. It may contain a destructive virus or keystroke logger.
• Unsecured memory sticks are easily stolen or copied. They may still contain valuable information, even if “erased”. Always secure these data storage devices. In a business setting, the data on the device should be password protected and encrypted. The most extreme example of this seen to date is the Cryptek...
• “Found on the ground” USB sticks are risky. They may have been planted for you to find. Never plug one into a computer to see what is on it. It may contain a destructive virus or keystroke logger.
• Unsecured memory sticks are easily stolen or copied. They may still contain valuable information, even if “erased”. Always secure these data storage devices. In a business setting, the data on the device should be password protected and encrypted. The most extreme example of this seen to date is the Cryptek...
An encrypted USB memory stick with Da Vinci Code chastity belt!
This is what you want your executives to carry! (coming soon)
You can also make your own “cryptstick” using Murray Associates instructions.
USB Memory Stick Security Checklist
You can also make your own “cryptstick” using Murray Associates instructions.
USB Memory Stick Security Checklist
• Create a “no USB sticks unless pre-approved” rule.
• Warn employees that a gift USB stick could be a Trojan Horse gift.
• Warn employees that one easy espionage tactic involves leaving a few USB sticks scattered in the company parking lot. The opposition knows that someone will pick one up and plug it in. The infection begins the second they plug it in.
• Don’t let visitors stick you either. Extend the “no USB sticks unless pre-approved” rule to them as well. Their sticks may be infected.
Harassment Stick
The new Devil Drive elevates the office prank to a new level of sophistication. It looks like a regular USB thumb drive, but it’s actually a device of electronic harassment. The Devil Drive has three functions:
• Warn employees that a gift USB stick could be a Trojan Horse gift.
• Warn employees that one easy espionage tactic involves leaving a few USB sticks scattered in the company parking lot. The opposition knows that someone will pick one up and plug it in. The infection begins the second they plug it in.
• Don’t let visitors stick you either. Extend the “no USB sticks unless pre-approved” rule to them as well. Their sticks may be infected.
Harassment Stick
The new Devil Drive elevates the office prank to a new level of sophistication. It looks like a regular USB thumb drive, but it’s actually a device of electronic harassment. The Devil Drive has three functions:
• It causes annoying random curser movements on the screen.
• It types out random phrases and garbage text.
• It toggles the Caps Lock.
Just be aware of it should you hear complaints along these lines.
Chameleon Sticks
Some USB memory sticks have alter egos. They may look like simple memory sticks, but they are actually voice recorders or video cameras. Keep an eye out for these devices at business meetings.
Extra Credit
• It types out random phrases and garbage text.
• It toggles the Caps Lock.
Just be aware of it should you hear complaints along these lines.
Chameleon Sticks
Some USB memory sticks have alter egos. They may look like simple memory sticks, but they are actually voice recorders or video cameras. Keep an eye out for these devices at business meetings.
Extra Credit
• Lock out USB ports
• More USB security tips
The USB stick problem is only one business espionage vulnerability. There are hundreds more. When you are ready to fight back, contact counterespionage.com
• More USB security tips
Labels:
advice,
business,
computer,
counterespionage,
encryption,
espionage,
FREE,
Hack,
keystroke,
product,
Tips,
USB
Friday, February 17, 2017
Security Director Alert: USB Killer Stick II
Remember the USB Killer stick that indiscriminately and immediately fries about 95 percent of devices? (See the Security Scrapbook warning about it from last September.)
Well, now the company has released a new version that is even more lethal! And you can also buy an adapter pack, which lets you kill test devices with USB-C, Micro USB, and Lightning ports.
Further Reading: USB Killer, yours for £50, lets you easily fry almost every device
If you haven't heard of the USB Killer before, it's essentially a USB stick with a bunch of capacitors hidden within. When you plug it into a host device (a smartphone, a PC, an in-car or in-plane entertainment system), those capacitors charge up—and then a split second later, the stick dumps a huge surge of electricity into the host device, at least frying the port, but usually disabling the whole thing...
The new USB Killer V3, which costs about £50/$50, is apparently 1.5 times more powerful than its predecessor, is more lethal (it pumps out eight to 12 surges per second), and is itself more resistant to setups that might cause the USB Killer to fry itself. more
Spybusters Tip #783 - Block your USB ports with a USB lock and security tape. Aside from Killer Stick sabotage, USB ports are virus injection portals.
Well, now the company has released a new version that is even more lethal! And you can also buy an adapter pack, which lets you kill test devices with USB-C, Micro USB, and Lightning ports.
Further Reading: USB Killer, yours for £50, lets you easily fry almost every device
If you haven't heard of the USB Killer before, it's essentially a USB stick with a bunch of capacitors hidden within. When you plug it into a host device (a smartphone, a PC, an in-car or in-plane entertainment system), those capacitors charge up—and then a split second later, the stick dumps a huge surge of electricity into the host device, at least frying the port, but usually disabling the whole thing...
The new USB Killer V3, which costs about £50/$50, is apparently 1.5 times more powerful than its predecessor, is more lethal (it pumps out eight to 12 surges per second), and is itself more resistant to setups that might cause the USB Killer to fry itself. more
Spybusters Tip #783 - Block your USB ports with a USB lock and security tape. Aside from Killer Stick sabotage, USB ports are virus injection portals.
Subscribe to:
Posts (Atom)