Schema-Root.org logo

 

  cross-referenced news and research resources about

 memory-stick (jump-drive, thumb-drive) worms

Schema-Root.org logo
images:  google   yahoo YouTube
spacer

updated Wed. January 17, 2024

+
Secondly, to prevent any worm proliferation, organisations can have robust policy controls between systems on the network. Often ... When system A has been exploited with malware delivered by a thumb drive 'save to' command, that file can be saved to an unlimited number of trusted machines (systems B ...

Linux users running KDE Plasma desktop environments need to apply patches to fix a bug that can lead to malicious code execution every time a user mounts a USB thumb drive on his computer. The KDE Plasma team has released versions 5.8.9 and 5.12.0 to address the issue, tracked as ...
More recently, an unencrypted memory stick containing sensitive information about London's Heathrow airport was found in West London. The prime example of just how much havoc a piece of malware lurking on a USB drive can wreak was provided by Stuxnet. That worm resulted in major damage to ...
“Further, local copy speeds are measured, demonstrating that 23 MB/s is a typical transfer rate when using a USB–2 flash device (thumb drive).” Time stamps in the metadata provide further evidence of what happened on July 5. The stamps recording the download indicate that it occurred in the Eastern ...
When plugged into a vulnerable system, the memory stick will immediately launch the legitimate Storewize initialization tool, which in this case also carries hidden malicious ... Faedevour!inf,” which Symantec notes is “a worm that opens a back door and steals information from the compromised computer.
A Russian computer researcher has developed what he calls the 'USB Killer 2.0' - a modified USB stick capable of frying the innards of any computer it's plugged in to. The researcher, who goes by the name Dark Purple, wrote about the device on his blog - though fortunately, there's no instructions on how ...
Stuxnet delivered to Iranian nuclear plant on thumb drive. Citing U.S. intelligence sources, ISSSource says an infected memory stick was used to hit the facility with the worm that severely damaged Iran's nuclear program. by. Daniel Terdiman. April 12, 2012 2:19 PM PDT. CBS Interactive. An Iranian double agent working for ...


resources


 

news and opinion


 


 


 


 


schema-root.org

   internet
    security
     malware
      worms
        memory‑stick

software worms:
        blaster
        conficker
        kido
        memory‑stick
        netsky
        nimda
        sasser
        smb worms
        storm
        stuxnet
        waledac