Short Bytes: On Modern Intel CPUs, the USB 3.0 port can be used to access the hardware debugging interface JTAG via DCI....
Only real defense for billions of devices is physically capping ports. Last year we wrote about the “USB Killer”—a DIY USB stick...
Short Bytes: Infecting people’s computers with the help of malicious USB drives is an old trick being used by hackers even today. Going...
Short Bytes: Willing to own your personal USB key that takes care of your password changing tasks? Using a USB, an ATtiny85,...
If you prevent access to your computer with just a password, you are missing out on an alternate (and more secure) way...
32GB of sweet USB flash drive storage space just sits in your office drawer, ironically taking up space. Why? Because you can’t...
WAS, is a simple automatic USB drive malware scanning tool that helps for people who often be in a hurry or absent...
The manufacturer USBKill.com has commercialized USB Kill 2.0, a USB dongle that is able to fry any computer through the USB ports....
USB Tester Short Bytes: The USB Killer stick that made headlines last year for being a brutal death to your innocent hardware...
First off, this is dead simple and shouldn’t work, but it does. Also, there is no possible way that I’m the first...
An ordinary USB drive (A) is sending information to a receiver (B) Short Bytes: A team of Israel’s Ben-Gurion University has developed a...
This is a hardware True Random Number Generator that attaches via USB. Version 0.3 This one uses the better noise source coupled...
Modems in a number of Samsung Galaxy devices are open to receiving AT commands over the USB cable even when they are...
Short Bytes: Security researchers have identified a new malware named USB Thief that has the ability to steal data from air-gapped computers without leaving...
A new USB device series has been launched by Kingston aiming to provide secure and tamper-proof thumb drive to IT professionals while...
Short Bytes: The maker of USB Killer is here with the USB Killer version 2.0 – a more advanced version of the...
Six weeks after hackers revealed vulnerabilities in a 2014 Jeep Cherokee that they could use to take over its transmission and brakes,...
Short Bytes: This DIY from Chris Robinson of NODE will show you how to make your own Linux computer from a USB...
Here’s a news that will cheer up all the activists, criminals, activists and whistle blowers. Now they have got a new tool...
The killer USB Drive has been designed especially to burn laptops – So be careful while inserting someone’s USB on your laptop. Have you heard...
The Killer USB USB drives are known be humble creatures that help you out by transferring your data. But, what if a...