Self-Destructing USBs

Sausner, Rebecca
September 2006
Bank Technology News;Sep2006 Supplement, Vol. 19, p10
Trade Publication
The article reports on the increasing use of encrypted USB drives to improve endpoint security in the U.S. It has found out that many institutions are running software that prevents end users from saving data to unauthorized devices like unencrypted USBs or iPods, or printing unauthorized data like customer records.


Related Articles

  • Lexar Introduces New Secure USB Drive.  // TWICE: This Week in Consumer Electronics;10/10/2005, Vol. 20 Issue 21, p10 

    The article announces the launch of the second generation of JumpDrive Secure universal serial bus flash drive from Lexar Media. The JumpDrive Secure II offers 256-bit ABS Encryption to secure folders and files along with a dashboard onscreen interface to navigate the drive's security features....

  • 23 THINGS TO DO WITH A THUMB DRIVE. Null, Christopher // PCWorld;Feb2006, Vol. 24 Issue 2, p113 

    This article discusses some of the portable uses and capabilities of USB flash drives. The encryption and biometric safeguards of USB flash drives serves as an emergency security kit applications for reviving compromised computers. The Lexar JumpDrive Secure II 1GB and the Kingston Data Traveler...

  • Security Think Tank: Physical security should be replicated in cyber world.  // Computer Weekly;8/29/2013, p1 

    The article discusses physical security in the cyber world wherein the old techniques of protecting the information and intellectual property of a user are still effective. It states that the modern operating systems has a firewall and a demilitarised zone (DMZ) for the installment of email...

  • Data Gone in a Flash. Mimoso, Michael S. // Information Security;Jun2006, Vol. 9 Issue 6, p17 

    This article reports on the dangers posed to business data and assets by unmanaged USB and other mobile storage devices. Drive capacity is expanding and some have their own processors that can manage encryption. However, most companies still do not have a policy regarding the utilization of USB...

  • Full Disk Encryption based on Virtual Machine and Key Recovery Scheme. Min Lianga; Chao-wen Changa // International Proceedings of Computer Science & Information Tech;2012, Vol. 51, p214 

    Full disk encryption is a good choice to solve the problem of information leakage. In this paper, a full disk encryption based on virtual machine is proposed for computers without TPM. The program to decrypt the operating system is stored in a USB device which is more secure than in hard disk...

  • Group test: USB security. Stephenson, Peter // SC Magazine: For IT Security Professionals (UK Edition);May2007, p54 

    The author discusses how universal serial bus (USB) security products for the "SC Magazine" product review were tested. He explains that the test they have done in this USB group review depended on the type of product. He adds that they tested each product to ensure that it has met its...

  • PASS2G0 USB KEY WITH AUTOMATED PASSWORD ENTRY. Lisenbach, Sharon // CRN;1/31/2005, Issue 1131, p62 

    Evaluates the Pass2Go universal serial bus key from Siber Systems. Integration of the RoboForm form-filler software into the system; Compatibility of the device with drives and ports; Encryption standard used to secure personal data within Pass2Go.

  • Cryptolocker Ransomware Variant Includes More Pernicious Features. Lemos, Robert // eWeek;1/6/2014, p3 

    The article discusses the capability of the Cryptolocker ransomware to spread to other computers and encrypt data. It states that the malware can self propagate through universal serial bus (USB) sticks. The malware aims to steal sensitive information including banking credentials or get a...

  • How to keep USB thumbdrive malware away from your PC. LEMOS, ROBERT // PCWorld;Jul2016, Vol. 34 Issue 7, p146 

    The article offers helpful tips for preventing malware in universal service bus (USB) thumbdrive from entering the personal computer (PC). Topics covered include buying a personal thrumbdrive to prevent BadUSB firmware-based attacks and not plugging or inserting untrusted USB drive into the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics