Storage devices and mobile control technology that uses "USB" such as a mouse, keyboard, flash memory
can be exploited to infiltrate computers in what is a new kind of attacks.
![]() |
New kind penetrate computer , control technology in portable storage that uses USB |
The hackers may have malicious programs on the computer sliced cheap cost control functions and USB devices, but does not contain the system of protection of internally .
You can not determine where the virus came?, and it seems almost like a magic trick
![]() |
New kind penetrate computer , control technology in portable storage that uses "USB |
The discovery shows that any defect in the software used to run the electronic components minutes does not see the normal computer user may be extremely dangerous if hackers discovered a way to exploit it.
Connect your (USB) with a computer, the malicious program can be recorded clicks typing on the keyboard and spying on communications and destroys data.
That computers do not monitor malicious program when you connect devices (USB) contaminated, because the anti-virus software is designed to examine the program is written to memory and it does not examine the firmware that controls the functions of these devices.
Comments
Post a Comment