Skip to main content

New kind penetrate computer , control technology in portable storage that uses "USB"



Storage devices and mobile control technology that uses "USB" such as a mouse, keyboard, flash memory 
can be exploited to infiltrate computers in what is a new kind of attacks.
 New kind penetrate computer , control technology in portable storage that uses "USB
 New kind penetrate computer , control technology in portable storage that uses USB


  The hackers may have malicious programs on the computer sliced ​​cheap cost control functions and USB devices, but does not contain the system of protection of internally .

You can not determine where the virus came?, and it seems almost like a magic trick

 New kind penetrate computer , control technology in portable storage that uses "USB
 New kind penetrate computer , control technology in portable storage that uses "USB
The discovery shows that any defect in the software used to run the electronic components minutes does not see the normal computer user may be extremely dangerous if hackers discovered a way to exploit it.
  Connect your (USB) with a computer, the malicious program can be recorded clicks typing on the keyboard and spying on communications and destroys data.

  That computers do not monitor malicious program when you connect devices (USB) contaminated, because the anti-virus software is designed to examine the program is written to memory and it does not examine the firmware that controls the functions of these devices.

Comments

Popular posts from this blog

Nokia reportedly plans a return to smartphones in 2016

Nokia is planning to make a comeback and return to making phones in 2016. That's according to personnel familiar with company plans, who reveal that releasing Android tablets under the brand simply isn't enough. Nokia reportedly plans a return to smartphones in 2016  Nokia reportedly plans a return to smartphones in 2016  With the introduction of the Nokia 2016 has become a company with freedom, where officially ended item that was part of Microsoft's takeover deal, which prevents the company from the competition in the mobile phone market and the issuance of phones under the brand Nokia the day before 12.31.2015. Nokia reportedly plans a return to smartphones in 2016  On the ground for the return of Nokia phones market was waiting and leaks that began to appear in the days abound and the days to come naturally to one of the most prestigious companies in the mobile industry. Nokia reportedly plans a return to smartphones in 2016  Today featur...

The best types of domestic cats

There are a lot of people are taking pet breeding hobby to them, and enjoy spending their leisure time with these animals that way that makes this Anisa them in their unity animals, but sometimes they consider a close friend to them, and the best pet animals raised at home, are cats, Cats are the most common among people household pets, because it has its own form attractive and wonderful show great qualities such as intimacy, tranquility and loyalty to the educators, they also give the home cheery and nice atmosphere for her love of fondling, and here we have put to you a list of the best domestic cats . The best types of domestic cats : Angora Turkish :  The best types of domestic cats  of Turkish origin, has a special dense fur around the neck and chest, and light his coat from the bottom, the head medium-sized, and he has big ears, eyes almond-shaped can be blue or orange or green, and possible to be appointed, including a blue second eye oran...

Microsoft decided 4.7 million device at least from personal computers infected with malware developers prepared and published in Kuwait and Algeria.

Microsoft decided 4.7 million device at least from personal computers infected with malware developers prepared and published in Kuwait and Algeria. Microsoft decided 4.7 million device at least from personal computers infected with malware developers prepared and published in Kuwait and Algeria. Microsoft decided 4.7 million device at least from personal computers infected with malware developers prepared and published in Kuwait and Algeria. These victims do not realize they are infected currently  Char that "the editing process" is the most successful of the last century between the operations carried out by the Digital Crimes Unit at Microsoft so far depending on the number of infected machines that could be identified.  Microsoft has identified personal devices infected by intercepting communication with hardware servers in the company, "Vitaloerks" Web Solutions, based in Reno, Nevada.  Vitaloerks criticized the way in which Microsoft has d...