Categories: Computer Security

Meet The USG Hardware Firewall To Protect Your USB ports From Untrusted USB Devices

USG is a Hardware firewall for your USB ports, permits users to associate USB flash drives and other USB gadgets to their PC without any security risks.

Firewall

A firewall is Software/Hardware acts as a wall between a trusted system or network and outside connections. Firewalls have been the first layer of defense in security for years.

Apart fro this, An organization point of view, Placing a web-application firewall can filter out the malicious SQL queries in the traffic and other dangerous web application threats

USG Firewall for USB Ports

The USG is a little, versatile hardware USB firewall that segregates a potentially harmful device from your PC.

USG, created by New Zealander Robert Fisk, USG does supports for mass storage (flash drives), keyboards, and mouse. Future firmware amendments may include additional gadgets and features.

Hardware Firewall for your USB portsHardware Firewall for your USB ports

USG, which keeps running on custom firmware, just let data to pass, disregarding any sort of low-level communications between the USB gadget and PC.

More than that USG can protect in both ways, it will protect our USB devices when connecting to unfamiliar computers and protect our computer when connecting to unfamiliar USB devices.

Along with this, a Strong web-application firewall such as Incapsula CDN identifying the malicious threats using several layers of security policies.

Why Should I use USG, Antivirus can save me

Badusb firmware cannot be detected by file-based scanner like Antivirus. Commands from malicious USB can directly reach USB stack and infects the computer.

This infection occurs even before the file based scanner realizes the activity. Everything! Besides Windows, Mac OS, and Linux, embedded systems with USB ports are also likelily vulnerable to BadUSB.

How does USG Benefit me

If you purchase a new USB device, then you unpack and insert directly into your computer. That would harm the computer if the device comes with pre-installed backdoors.

Here is the checklist which insists him to create a USG Firewall

  • Do you know who developed your flash drive’s firmware? (It’s probably not the company name printed on the packaging).
  • Has the firmware been reviewed for backdoor accesses and malware infections?.
  • Could you affirm that the firmware running on your drive hasn’t been maliciously changed while or after production?

The USG’s firmware is fully open and auditable. The USG confines BadUSB devices from your PC, in the meantime it can also pass through the information you require.

How can I buy or make this USG

You can order your own USG v1.0 hardware firewall by contacting their developer and the Prize NZ$80.

And the interesting thing is you can build your own USG, here you find instructions.

Limitations of USG

  • USG1.0 uses a 12Mbps hardware, so the maximum speed of transfer will be around 1MB per sec.
  • With USG1.0 supports mass storage (flash drives), keyboards, and mouse. They would add support for additional devices in future revisions.

Also Read

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Halo ITSM Vulnerability Lets Attackers Inject Malicious SQL Code

A critical security flaw has been discovered in Halo ITSM, an IT support management software widely…

40 minutes ago

Australian Pension Funds Hacked: Members Face Financial Losses

Several of Australia’s largest superannuation funds have been targeted in a coordinated cyberattack, leading to…

1 hour ago

Frida Penetration Testing Toolkit Updated with Advanced Threat Monitoring APIs

In a significant update to the popular dynamic instrumentation toolkit Frida, developers have introduced powerful…

1 hour ago

OpenVPN Flaw Allows Attackers Crash Servers and Run Remote Code

OpenVPN, a widely-used open-source virtual private network (VPN) software, has recently patched a security vulnerability…

3 hours ago

Apache Traffic Server Flaw Allows Request Smuggling Attacks

A critical vulnerability has been discovered in Apache Traffic Server (ATS), an open-source caching proxy…

3 hours ago

Secure Ideas Achieves CREST Accreditation and CMMC Level 1 Compliance

Secure Ideas, a premier provider of penetration testing and security consulting services, proudly announces its…

16 hours ago