It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Remember that fundamental USB security flaw that a pair of researchers unearthed back in July? You know, the one that allegedly affects every single USB device in the wild for which there is no fix for. While they did publically demonstrate the flaw using a piece of malware they created called BadUSB, the duo elected not to release the code. A couple of other researchers, however, decided to throw caution to the wind by posting code for a similar attack on Github. During the recent Derbycon hacker convention, researchers Adam Caudill and Brandon Wilson revealed that they were also able to reverse engineer the USB firmware that Karsten Nohl and Jakob Lell spoke of a few months ago.
originally posted by: andy06shake
...
Maybe some kind of third party interface/dongle that circumvents the security issue, like an adapter between the device and the USB port? Means £££ for someone.
Blaze suggested the attack may already be in use by the NSA. Caudill believes that if the only people who can use it are those with significant budgets, manufactures will never do anything about it. Proving to the world that it is practical and anybody can do it puts pressure on manufacturers to fix it, he said.