Page 56 - index
P. 56
+0- "1& " * +*/ &* (2 -" 4 +2 /+ ") &* #"
USBs have become an extremely valuable tool for use with computers. They easily allow the
storage and transfer of information from one computer to any other computer. This convenient
transference of data from computer to computer has revolutionized the efforts of business
employees and educational students alike, allowing work files to be completed in one location
and then taken to another for completion or presentation. Average computer users also find
USBs to be extremely helpful for transferring files such as photos or documents from computers
to other sites.
Hidden Dangers of USBs
Most people go about their days believing that they are relatively safe from harm and that
malicious attacks will not happen to them. This is the same attitude that can devastate lives by
malicious people bent on taking advantage of such gullibility. USB usage is a prime example.
Many people are not aware that USBs can be easily infected with a variety of malware that can
be carried from computer to computer. Once the USB is plugged into a device, the malware
provides access to files, information and even complete control of the computer from an outside
source.
Even those people who understand such dangers exist in USBs believe that they are 100
percent protected by popular antivirus software such as Norton or McAfee. The fact is that most
traditional software designed for antivirus detection only search for threats in “viewable” files
(those which can be viewed directly on Windows or Mac). Virus designers, however, are finding
ways to escape detection by hiding their creations in the actual operational code that is used to
tell the computer what to do. Currently, this area of a USB cannot be searched by antivirus
software.
Types of USB Dangers
There exist a wide variety of harmful threats that can be transferred between computers via
USBs. Even if a USB is infected by traditional malware that can be detected by good antivirus
software like Immunet, if you do not have the software installed then such threats cannot be
detected. Here is a list of potential threats that can be delivered via USB:
Malware – This is the term used to describe any illegal or questionable program that
compromises the integrity of computers. Malware, viruses and other types of shady programs
can cause a variety of problems from those that are simply irritating to those that are extremely
severe, causing damage and great expense.
Spyware – This type of hidden program is designed to infiltrate computer systems and track
movement codes so that where you go and what you view online can be observed by spyware
operators.
Loss of Data – Some types of malware cause data to be eliminated. Depending on the infecting
program, these losses can be minor or major.
I25B /1B>9>7C &171J9>5 M +5@D5=25B 49D9?>
?@IB978D K I25B 565>C5 &171J9>5 << B978DC B5C5BF54 G?B<4G945