This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Friday, December 06, 2013

USB Type-C

The USB 3.0 Promoter Group announced the USB Type-C connector which will be built on existing USB 3.1 and USB 2.0 technologies. This should give way for thinner and sleeker designs of devices, enhanced usability and should light up the future of USB.

The USB or Universal Serial Bus is probably the most popular type of plug today. From phones, tablets, PCs, cameras and more, USB is there. Fresh from the USB 3.1 update, the creators of the USB is taking it a step further.



The key characteristics of the USB Type-C as stated on the press release:


* An entirely new design tailored to work well with emerging product designs
* New smaller size – similar in size to the existing USB 2.0 Micro-B
* Usability enhancements – users will no longer need to be concerned with plug
orientation/cable direction, making it easier to plug in
* The Type-C connector and cable will support scalable power charging
* Scalability – the connector design will scale for future USB bus performance
Bad news is, the new plug will not be directly compatible with existing cables and ports but adapters will be designed as well. The USB Type-C is aimed for industry review around the first quarter next year and
 shall be completed by the middle of 2014.


UPDATE: http://blogmytuts.blogspot.com/2014/08/reversible-usb-type-c-connector.html




Thursday, December 05, 2013

Malware attacks are now just a sound away




If you think that a computer which is not connected to a network, doesn't have any USB sticks attached to it and doesn’t accept any kind of electronic connection requests are reasonably safe against hackers and from all the malware, then you are Wrong.
Here we have something shocking update that Some German Scientists have developed a proof of concept Malware prototype, could allow a hacker to infect your computers and other digital devices just using Inaudible Audio signals.

The ability to bridge an air gap could be a potent infection vector. Just imagine, a cyber attack using high-frequency sound waves to infect machines, where stolen data also can be transferred back to attacker without a network connection, Sounds very terrifying ?

When a few weeks ago, a security researcher Dragos Ruiu claimed malware dubbed badBIOS allowed infected machines to communicate using sound waves alone, means that the devices are physically disconnected from any networks, including the internet,  people said he was crazy.
 





But Now German Researchers have published a paper on how malware can be designed to cross the air gap by transmitting information through speakers and recording it via microphone.

Rather than relying on TCP-IP, they used a network stack originally developed for underwater communication and the signal was propagated through the use of a software-defined modem based on the GNU Radio project.

In a scenario based hacking, “The infected victim sends all recorded keystrokes to the covert acoustical mesh network. Infected drones forward the keystroke information inside the covert network till the attacker is reached, who is now able to read the current keyboard input of the infected victim from a distant place.” paper explained.






In another scenario, the researchers used sound waves to send keystroke information to a network-connected computer, which then sent the information to the attacker via email.

While the research doesn’t prove Dragos Ruiu’s badBIOS claims, but it does show that even if the system is disconnected from any network, could still be vulnerable to attackers. However, I would like to appreciate Dragos dedication about badBIOS research because this extraordinary concept was first introduced by him only.

Researchers POC Malware is able to transfer data at 20 bits per second only, which is very low, but that's still capable of transferring your password or credit card number to the hacker in a few seconds.

Some basic countermeasures one can adopt to protect against such malware are:
·                                 Switching off the audio input and output devices from the system.
·                                 Employ audio filtering that blocks high-frequency ranges.
·                                 Using an Audio Intrusion Detection Guard.
 


 Source:http://thehackernews.com/2013/12/Malware-Inaudible-Audio-signals-badbios-virus.html