How it really happened : NINJIO Season 1, Episode 1 – Rogue USB Devices

As we saw in Season 1, Episode 1, Dave’s curiosity got the best of him when coming across a rogue USB Drive.  By plugging the drive into his computer, the Hacker was able to gain access to the on-board computer systems of the vehicles that they manufactured.

Article 1 below will tell you more about this particular breach.  The other articles are about the different types of USB threats and how else hackers can use USB Drives to attack us.

 

  1. HOW IT REALLY HAPPENED: Wired – Hackers Remotely Kill a Jeep on the Highway

The next time you plug in that suspicious USB, think of the implications. Wired covers the Chrysler attack and even performs a trial run to create a proof of concept. The article covers what the hackers were able to do – turn on the A/C vents, display their images in the center console, and even disabled the car’s braking system.

 

  1. Watch a USB Hack in Action

The rule of thumb for years was that Mac users were safe from malware, but that’s not the case any longer. This article shows you how an attack occurs when a hacker is able to trick users into plugging in a suspicious USB. The code on the USB acts like a keyboard and mouse, which is then used to perform any click or keystroke on the computer.

 

  1. A USB Drive That Can Fry a Computer

The next time you plug in a suspicious USB drive, consider that it can completely fry your computer. It can send volts to your computer, which essentially overloads your computer’s circuits with electricity and renders them useless.

 

  1. Car Hacking: What Every Drive Needs to Know

Hackers can do more than just stop your brakes. They can access all kinds of information from the car’s computer including the engine. Learn what a hacker can do if he can access your car’s computer.

 

  1. Hackers Use USB Devices to Hack a Safe

You no longer need explosives to break into a safe. This article covers the way hackers can get into the most physically secure devices – safes – using a USB stick.

 

 

10 Comments
  • Jorge Aguilar
    Posted at 23:42h, 22 January

    informative

  • BIANKA SCHALCHER
    Posted at 23:55h, 22 January

    cool

  • Margarita
    Posted at 23:37h, 01 February

    Pretty Informative

  • Tammy Vasquez
    Posted at 21:26h, 16 February

    great information

  • Lynn Thomas
    Posted at 22:17h, 16 February

    Thank you for the information

  • Carmen.Rosario
    Posted at 12:06h, 16 March

    HELLO, THIS IS VERY GOOD INFORMATION TO KNOW, Thank You.

  • lUCY MAGDALENO
    Posted at 20:14h, 15 June

    great information to keep in mind.

  • lUCY MAGDALENO
    Posted at 20:15h, 15 June

    GREAT INFORMATION TO IN CASE BY CASE.

  • Jack
    Posted at 18:43h, 21 June

    I wish hackers would be thinking for the betterment on humanity than causing issues.

  • ezequiel l. huerta
    Posted at 16:38h, 24 June

    good up to date videos.