18 Jan How it really happened : NINJIO Season 1, Episode 1 – Rogue USB Devices
As we saw in Season 1, Episode 1, Dave’s curiosity got the best of him when coming across a rogue USB Drive. By plugging the drive into his computer, the Hacker was able to gain access to the on-board computer systems of the vehicles that they manufactured.
Article 1 below will tell you more about this particular breach. The other articles are about the different types of USB threats and how else hackers can use USB Drives to attack us.
HOW IT REALLY HAPPENED: Wired – Hackers Remotely Kill a Jeep on the Highway
The next time you plug in that suspicious USB, think of the implications. Wired covers the Chrysler attack and even performs a trial run to create a proof of concept. The article covers what the hackers were able to do – turn on the A/C vents, display their images in the center console, and even disabled the car’s braking system.
The rule of thumb for years was that Mac users were safe from malware, but that’s not the case any longer. This article shows you how an attack occurs when a hacker is able to trick users into plugging in a suspicious USB. The code on the USB acts like a keyboard and mouse, which is then used to perform any click or keystroke on the computer.
The next time you plug in a suspicious USB drive, consider that it can completely fry your computer. It can send volts to your computer, which essentially overloads your computer’s circuits with electricity and renders them useless.
Hackers can do more than just stop your brakes. They can access all kinds of information from the car’s computer including the engine. Learn what a hacker can do if he can access your car’s computer.
You no longer need explosives to break into a safe. This article covers the way hackers can get into the most physically secure devices – safes – using a USB stick.