USB attacks!Offensive Cyber Security

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

Home Forums Cyber Security Offensive Cyber Security USB attacks!

This topic contains 3 replies, has 3 voices, and was last updated by  D74CC0 2 years, 11 months ago.

Viewing 4 posts - 1 through 4 (of 4 total)
  • Author
    Posts
  • #84182

    D74CC0
    Participant

    Looking for the best practices and protection for USB attacks on your devices when you are NOT around. Please feel free to post your opinions, advises and links to learn how to avoid this new type of attacks.

    #86417

    palor
    Participant

    For operating system attack, most USB attacks require the computer to be logged in at the desktop for it to launch an attack. So locking your workstation/laptop when you’re away manually will reduce the risk greatly. Set up policies so the laptop/workstation auto locks will help if you forget to manually lock. Antivirus can detect some USB attacks. There is also software that can lock down the USB ports so nothing can be launched/accessed with a USB key is plugged in.

    If the computer is off, and you don’t want anyone to boot off a USB key, enable password protection in the BIOS and disable USB boot.

    #101038

    DrakOS
    Participant

    Hi,
    on Windows with my company I use “Windows USB Blocker”.

    #102602

    D74CC0
    Participant

    Hello DrakOS, can you provide more info about that software? I would be pleased. Thanks in advance! Wish you a great day!

    • This reply was modified 2 years, 11 months ago by  D74CC0.
Viewing 4 posts - 1 through 4 (of 4 total)

You must be logged in to reply to this topic.

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel