HOW IT REALLY HAPPENED: KEEPNET NINJIO SEASON 1, EPISODE 1 – ROGUE USB DEVICESOrhan Sari
Rogue Usb Devices cybersecurity phishing awareness training – how it really happened: Ninjio Season 1, Episode 1
As we saw in Season 1, Episode 1, Dave’s curiosity got the best of him when coming across a rogue USB Drive. By plugging the drive into his computer, the Hacker was able to gain access to the on-board computer systems of the vehicles that they manufactured.
Article 1 below will tell you more about this particular breach. The other articles are about the different types of USB threats and how else hackers can use USB Drives to attack us.
Rogue Usb Devices cybersecurity phishing awareness training
1. HOW IT REALLY HAPPENED: WIRED – HACKERS REMOTELY KILL A JEEP ON THE HIGHWAY 1
The next time you plug in that suspicious USB, think of the implications. Wired covers the Chrysler attack and even performs a trial run to create a proof of concept. The article covers what the hackers were able to do – turn on the A/C vents, display their images in the centre console, and even disabled the car’s braking system.
2. WATCH A USB HACK IN ACTION 2
The rule of thumb for years was that Mac users were safe from malware, but that’s not the case any longer. This article shows you how an attack occurs when a hacker is able to trick users into plugging in a suspicious USB. The code on the USB acts like a keyboard and mouse, which is then used to perform any click or keystroke on the computer.
3. A USB DRIVE THAT CAN FRY A COMPUTER 3
The next time you plug in a suspicious USB drive, consider that it can completely fry your computer. It can send volts to your computer, which essentially overloads your computer’s circuits with electricity and renders them useless.
4. CAR HACKING: WHAT EVERY DRIVE NEEDS TO KNOW4
Hackers can do more than just stop your brakes. They can access all kinds of information from the car’s computer including the engine. Learn what a hacker can do if he can access your car’s computer.
5. HACKERS USE USB DEVICES TO HACK A SAFE 5
You no longer need explosives to break into a safe. This article covers the way hackers can get into the most physically secure devices – safes – using a USB stick.