Tuesday, June 18, 2024

Meet The USG Hardware Firewall To Protect Your USB ports From Untrusted USB Devices

USG is a Hardware firewall for your USB ports, permits users to associate USB flash drives and other USB gadgets to their PC without any security risks.

Firewall

A firewall is Software/Hardware acts as a wall between a trusted system or network and outside connections. Firewalls have been the first layer of defense in security for years.

Apart fro this, An organization point of view, Placing a web-application firewall can filter out the malicious SQL queries in the traffic and other dangerous web application threats

USG Firewall for USB Ports

The USG is a little, versatile hardware USB firewall that segregates a potentially harmful device from your PC.

USG, created by New Zealander Robert Fisk, USG does supports for mass storage (flash drives), keyboards, and mouse. Future firmware amendments may include additional gadgets and features.

Hardware Firewall for your USB ports

USG, which keeps running on custom firmware, just let data to pass, disregarding any sort of low-level communications between the USB gadget and PC.

More than that USG can protect in both ways, it will protect our USB devices when connecting to unfamiliar computers and protect our computer when connecting to unfamiliar USB devices.

Along with this, a Strong web-application firewall such as Incapsula CDN identifying the malicious threats using several layers of security policies.

Why Should I use USG, Antivirus can save me

Badusb firmware cannot be detected by file-based scanner like Antivirus. Commands from malicious USB can directly reach USB stack and infects the computer.

This infection occurs even before the file based scanner realizes the activity. Everything! Besides Windows, Mac OS, and Linux, embedded systems with USB ports are also likelily vulnerable to BadUSB.

How does USG Benefit me

If you purchase a new USB device, then you unpack and insert directly into your computer. That would harm the computer if the device comes with pre-installed backdoors.

Here is the checklist which insists him to create a USG Firewall

  • Do you know who developed your flash drive’s firmware? (It’s probably not the company name printed on the packaging).
  • Has the firmware been reviewed for backdoor accesses and malware infections?.
  • Could you affirm that the firmware running on your drive hasn’t been maliciously changed while or after production?

The USG’s firmware is fully open and auditable. The USG confines BadUSB devices from your PC, in the meantime it can also pass through the information you require.

How can I buy or make this USG

You can order your own USG v1.0 hardware firewall by contacting their developer and the Prize NZ$80.

And the interesting thing is you can build your own USG, here you find instructions.

Limitations of USG

  • USG1.0 uses a 12Mbps hardware, so the maximum speed of transfer will be around 1MB per sec.
  • With USG1.0 supports mass storage (flash drives), keyboards, and mouse. They would add support for additional devices in future revisions.

Also Read

Website

Latest articles

Singapore Police Arrested Two Individuals Involved in Hacking Android Devices

The Singapore Police Force (SPF) has arrested two men, aged 26 and 47, for...

CISA Conducts First-Ever Tabletop Exercise Focused on AI Cyber Incident Response

On June 13, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) made history by...

Europol Taken Down 13 Websites Linked to Terrorist Operations

Europol and law enforcement agencies from ten countries have taken down 13 websites linked...

New ARM ‘TIKTAG’ Attack Impacts Google Chrome, Linux Systems

Memory corruption lets attackers hijack control flow, execute code, elevate privileges, and leak data.ARM's...

Operation Celestial Force Employing Android And Windows Malware To Attack Indian Users

A Pakistani threat actor group, Cosmic Leopard, has been conducting a multi-year cyber espionage...

Hunt3r Kill3rs Group claims they Infiltrated Schneider Electric Systems in Germany

The notorious cybercriminal group Hunt3r Kill3rs has claimed responsibility for infiltrating Schneider Electric's systems...

Hackers Employing New Techniques To Attack Docker API

Attackers behind Spinning YARN launched a new cryptojacking campaign targeting publicly exposed Docker Engine...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles