Turning USB peripherals into Bad USB device
No effective defenses from USB attacks are known. Malware scanners cannot access the firmware running on USB devices. USB firewalls that block certain device classes do not (yet) exist. And behavioral detection is difficult, since a BadUSB device’s behavior when it changes its persona looks as though a user has simply plugged in a new device. To make matters worse, cleanup after an incident is hard: Simply reinstalling the operating system – the standard response to otherwise ineradicable malware – does not address Bad USB infections at their root. The USB thumb drive, from which the...
read moreCRC Technologies announces partnership
FOR IMMEDIATE RELEASE MEDIA CONTACTS: Jules Johnston, AuthAir, Inc. (203) 361-9031, jjohnston@authair.com James Cosgrove, Computer Resources Corporation (CRC) Technologies (206) 441-5042, james@crctechs.com Computer Resources Corporation (CRC) Technologies announces partnership With HIPAA security weapon AuthAir Inc. SEATTLE, WASHINGTON — Puget Sound-based CRC, a trusted provider of IT products and services to dental and medical clients Washington state wide, is pleased to confirm it will now offer a practical, actionable solution in the face of growing pressure for practices to comply with...
read more