Researchers from the Ben-Gurion University of the Negev in Israel have identified 29 ways in which attackers could use USB devices to compromise users' computers.
Microsoft released yesterday a Windows update to fix driver issues with USB devices introduced in the February 2018 Patch Tuesday security updates.
Linux users running KDE Plasma desktop environments need to apply patches to fix a bug that can lead to malicious code execution every time a user mounts a USB thumb drive on his computer.
Taiwanese police have handed out malware-infected USB thumb drives to the winners of a cyber-security quiz at a data security expo hosted in December last year by the country's Presidential Office.
Details have emerged about one of the vulnerabilities patched by Apple in macOS on October 31, with the release of macOS High Sierra 10.13.1, Sierra 10.12.6, and El Capitan 10.11.6.
The Savitech USB audio driver installation package will install a root CA certificate into the Windows trusted root certificate store, in an incident that's reminiscent of the Superfish and eDellRoot episodes from 2015 and 2016, respectively.
Mazda cars with next-gen Mazda MZD Connect infotainment systems can be hacked just by plugging in a USB flash drive into their dashboard, thanks to a series of bugs that have been known for at least three years.
IBM has issued a security alert last week, warning customers that some USB flash drives shipped with IBM Storwize products may contain malicious code.
A new tool released on GitHub last week can help paranoid sysadmins keep track of whenever someone plugs in or disconnects an USB-based device from high-value workstations.
The USG is an USB attachment that allows users to connect USB flash drives and other USB devices to their computer without any of the risks.
A commercial device known as USB Kill 2.0 allegedly has the ability to fry a number of electrical devices by sending an electrical charge to a public-facing USB port. Using a standard USB port, USB Killer will charge itself with electricity and then discharge to fry the device it is plugged into.
Researchers have created a piece of software that uses an unmodified USB device to leak data stored on an air-gapped computer over radio frequency (RF) signals.