USB

Is your encrypted USB drive secure?

https://www.kaspersky.com/blog/encrypted-usb-drives-audit/17948/?utm_source=kasperskysocialchannel.com&utm_medium=Kaspersky+Lab+%28Employees%2C+USA%29&utm_campaign=kasperskysocialchannel.com How can you be sure the “secure” USB drive you’re using is really secure and the data you store on it can’t be extracted? That’s exactly the question Google’s security researchers Ellie Bursztein, Jean-Michel Picod, and Rémi Audebert addressed in their talk, “Attacking encrypted USB keys the hard(ware) way,” at the recent Black Hat

​How to use Linux’s built-in USB attack protection | ZDNet

http://www.zdnet.com/article/how-to-use-linuxs-built-in-usb-attack-protection/ USB is insecure. There are USB sticks that will destroy your computer, USB sticks loaded with spyware, and even official enterprise USB sticks infected with malware. Windows and Macs are easy to crack with USB-borne tools. There are devices like the USG USB stick firewall, which can protect you. Linux users can stop attackers armed with USB sticks with USBGuard software.

USB quick charging and Honor 8

Modern smart phones use lots of powr, have high capacity batteries and many people want that they can be charged quickly. Fast charging is a name for battery charging technologies that charges the battery faster that normally by increasing the charging power. The standard USB charging is somewhat complicated enough with several standard versions and

Cell phone charger

I have used some for time Barkan PB22B 2200mah Portable Charger Black to charge my smart Samsung S4 mini phone. I had some issues first that the charging was not reliable with my phone (worked well with some other devices). I decided to look what was wrong with USB Power Current Voltage Tester, and with

Meet USBee, the malware that uses USB drives to covertly jump airgaps | Ars Technica

http://arstechnica.com/security/2016/08/meet-usbee-the-malware-that-uses-usb-drives-to-covertly-jump-airgaps/ This hack makes an USB drive to transmit your secrets in a way a nearby radio can receive it. Technique works on virtually all USB drives with no modifications necessary. “We introduce a software-only method for short-range data exfiltration using electromagnetic emissions from a USB dongle,” The software works on just about any storage