Categories: Computer Security

Meet The USG Hardware Firewall To Protect Your USB ports From Untrusted USB Devices

USG is a Hardware firewall for your USB ports, permits users to associate USB flash drives and other USB gadgets to their PC without any security risks.

Firewall

A firewall is Software/Hardware acts as a wall between a trusted system or network and outside connections. Firewalls have been the first layer of defense in security for years.

Apart fro this, An organization point of view, Placing a web-application firewall can filter out the malicious SQL queries in the traffic and other dangerous web application threats

USG Firewall for USB Ports

The USG is a little, versatile hardware USB firewall that segregates a potentially harmful device from your PC.

USG, created by New Zealander Robert Fisk, USG does supports for mass storage (flash drives), keyboards, and mouse. Future firmware amendments may include additional gadgets and features.

USG, which keeps running on custom firmware, just let data to pass, disregarding any sort of low-level communications between the USB gadget and PC.

More than that USG can protect in both ways, it will protect our USB devices when connecting to unfamiliar computers and protect our computer when connecting to unfamiliar USB devices.

Along with this, a Strong web-application firewall such as Incapsula CDN identifying the malicious threats using several layers of security policies.

Why Should I use USG, Antivirus can save me

Badusb firmware cannot be detected by file-based scanner like Antivirus. Commands from malicious USB can directly reach USB stack and infects the computer.

This infection occurs even before the file based scanner realizes the activity. Everything! Besides Windows, Mac OS, and Linux, embedded systems with USB ports are also likelily vulnerable to BadUSB.

How does USG Benefit me

If you purchase a new USB device, then you unpack and insert directly into your computer. That would harm the computer if the device comes with pre-installed backdoors.

Here is the checklist which insists him to create a USG Firewall

  • Do you know who developed your flash drive’s firmware? (It’s probably not the company name printed on the packaging).
  • Has the firmware been reviewed for backdoor accesses and malware infections?.
  • Could you affirm that the firmware running on your drive hasn’t been maliciously changed while or after production?

The USG’s firmware is fully open and auditable. The USG confines BadUSB devices from your PC, in the meantime it can also pass through the information you require.

How can I buy or make this USG

You can order your own USG v1.0 hardware firewall by contacting their developer and the Prize NZ$80.

And the interesting thing is you can build your own USG, here you find instructions.

Limitations of USG

  • USG1.0 uses a 12Mbps hardware, so the maximum speed of transfer will be around 1MB per sec.
  • With USG1.0 supports mass storage (flash drives), keyboards, and mouse. They would add support for additional devices in future revisions.

Also Read

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Burp Suite 2025.1 Released, What’s New!

Burp Suite 2025.1, is packed with new features and enhancements designed to improve your web…

2 hours ago

Chrome Security Update – Patch for 3 High-Severity Vulnerabilities

Google has released a critical update for the Chrome browser, addressing three high-severity security vulnerabilities.…

3 hours ago

New Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials

Researchers have identified a sophisticated phishing tactic leveraging Cloudflare's workers.dev, a free domain name service,…

3 hours ago

Weaponised XWorm RAT Builder Attacking Script Kiddies To Hack 18,000 Devices

A recent cybersecurity attack involving a Trojanized version of the XWorm Remote Access Trojan (RAT)…

3 hours ago

LockBit Ransomware: 11-Day Timeline from Initial Compromise to Deployment

A well-coordinated cyber intrusion, spanning 11 days, culminated in the deployment of LockBit ransomware across…

4 hours ago

Apache Solr For Windows instances Vulnerability Allows Arbitrary Path Write-Access

A critical security vulnerability (CVE-2024-52012) affecting Apache Solr instances on Windows has been identified, allowing…

4 hours ago