Can this device prevent USB network attacks? is that true?

We all know that malicious USB drives pose a major security threat to consumers and organizations

Although USB devices (such as flash drives) are convenient and make it easier to move data between devices, they can also be abused by cybercriminals to infect computers with malware and other viruses.

This is why a group of scientists and professors from Liverpool Hope University in the United Kingdom have created a sophisticated new device that can deal with the threat posed by malicious USB devices.

The project, led by Dr. Shishir Kumar Shandilya and Professor Atulya Nagar, aims to eliminate one of the most common paths through which attackers and cybercriminals can inject malicious files and programs.

Dr. Shandilya provided information on how to interact with flash drives. One of the main issues is that the computer has a better understanding of the operating system. The operating system usually treats it as a “trusted component”. He said: “If the operating system is not configured to limit and Elevate the user’s authority to the inserted USB device, then as long as the USB drive is inserted, it can execute the default auto-run script, which can transfer the expected payload to the computing device and transfer multiple types of viruses, Trojan horses, and keyloggers , Spyware, remote access Trojan (RAT) and other malicious programs are transmitted to computing devices.”

Intermediate equipment
For this reason, Dr. Shandilya and Professor Nagar came up with the idea of ​​using a new type of “intermediate” device, which is located between a flash drive and a USB port on a laptop or computer.

This intermediary device acts as a gateway or barrier, capable of scanning USB drives for malware, which may prevent the cyber attack before it starts.

According to Dr. Shadilya, the team’s new invention protects the host computing device by providing an additional layer of hardware security that can also hide the host’s operating system information. This is achieved by providing disguised information about the computer to an external device. However, intermediary devices also have methods to identify malicious software, and can grant USB devices full access, partial access, or complete block permissions.

The team’s new device is part of an emerging field of cybersecurity research called Nature Inspired Cybersecurity (NICS). This new field combines natural ideas and phenomena to ensure that the operating system does not fall prey to predators and can withstand attacks.

Dr. Shadilya and the team are currently getting in touch with the manufacturer to bring the device to the market, even though they already have a fully functional prototype.

》 》 》 》 》 》 》 》 》Laptop’s battery

What do you guys think? Let us look forward to its arrival! Thank you for reading

Friendly reminder: Friends who need batteries can click on the following online shop: www.batteryforpc.co.uk