A connected device could function as a USB Ethernet adapter and route traffic over malicious servers. More sneakily, a USB flash drive could appear to function normally, but the firmware could modify files as they leave the device, infecting them. Thanks to keyboard shortcuts, a malicious firmware functioning as a keyboard could-for example-open a Command Prompt window, download a program from a remote server, run it, and agree to a UAC prompt. When you connect it to your computer, it could send keyboard-press actions to the computer as if someone sitting at the computer were typing the keys. For example, a USB flash drive with malicious firmware could function as a USB keyboard. The key to this problem is the design goal that USB devices could do many different things. Read our full Kingston IronKey Vault Privacy 80 review. It’s expensive by storage standards, but the VP80ES is a solid attempt at providing an easy-to-use, transportable and secure repository. Out of the box, it comes with a soft carry pouch and two cables for USB-A and USB-C connections. The storage component is an SSD, although this drive can only achieve reading and writing of around 250MB/s over a USB 3.2 Gen 1 connection. And, the drive will erase the contents if too many passwords are incorrectly entered. Kingston designed it to cope with various potential attacks, including BadUSB and even physical intrusion into the mechanism. Secure encrypted storage devices once required software to be installed to provide a means to input the decryption key, but the Kingston IronKey Vault Privacy 80 circumvents the need for that with an inbuilt touch screen.Īvailable in 480GB, 960GB and 1920GB capacities, the VP80ES, as it's also known, sports FIPS 197 certified security and a Common Criteria EAL5+ certified secure microprocessor.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |