Windows 7 Plug and Prey: Malicious USB Devices

JMH

Senior Member
Abstract

This paper is meant as an overview of malicious USB devices. The paper will first lay out a proposed set of categories for malicious USB devices, how these categories function, how they differ, and how they can be used by an attacker. Next the paper will offer information on how these threats can be technically detected and mitigated, as well as human practices that can help alleviate the threats posed by malicious USB devices.

Plug and Prey: Malicious USB Devices
 
Back
Top