{"id":167923,"date":"2014-12-19T03:55:30","date_gmt":"2014-12-19T08:55:30","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/this-little-usb-necklace-hacks-your-computer-in-no-time-flat.php"},"modified":"2014-12-19T03:55:30","modified_gmt":"2014-12-19T08:55:30","slug":"this-little-usb-necklace-hacks-your-computer-in-no-time-flat","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/super-computer\/this-little-usb-necklace-hacks-your-computer-in-no-time-flat.php","title":{"rendered":"This Little USB Necklace Hacks Your Computer In No Time Flat"},"content":{"rendered":"<p><p>    Quick! The bad guy\/super villain has left the room! Plug in a    mysterious device thatll hack up their computer while an    on-screen progress bar ticks forward to convey to the audience    that things are working!  <\/p>\n<p>    Its a classic scene from basically every spy movie in history.    In this case, however, that mystery device is real.  <\/p>\n<p>    Samy Kamkar  developer of projects like that massive    worm that conquered MySpace back in 2006, or     SkyJack, the drone that hijacks other drones  has released    a video demonstrating the abilities of a particularly    ridiculous necklace he sometimes wears around.  <\/p>\n<p>    Called USBdriveby, its a USB-powered    microcontroller-on-a-chain, rigged to exploit the inherently    awful security flaws lurking in your computers USB ports. In    about 60 seconds, it can pull off a laundry list of nasty    tricks:  <\/p>\n<p>    So in 30-60 seconds, this device hijacks your machine, disables    many layers of security, cleans up the mess it makes, and opens    a connection for remote manipulation even after the device has    been removed. Thats kind of terrifying.  <\/p>\n<p>    While the video above focuses on OS X, the methods tapped here    arent exclusive to Apples platform. Kamkar says everything    shown so far is easily extendable to Windows or *nix.  <\/p>\n<p>    So what can you do to protect yourself from things like this?    Not a whole lot, really  thats why attacks like this and    BadUSB    are so freaky. A lot of these flaws are inherent to the way the    USB protocol was designed and implemented across so many    hundreds of millions of computers; short of filling your USB    ports with cement or never, ever leaving your    computers ports unattended while out and about, theres no    magic fix.  <\/p>\n<p>    [via Hacker News]  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here: <\/p>\n<p><a target=\"_blank\" href=\"http:\/\/techcrunch.com\/2014\/12\/18\/this-little-usb-necklace-hacks-your-computer-in-no-time-flat\/?ncid=rss\/RK=0\/RS=OQFKzEMIs3yezZeLuFGG6S6jPBw-\" title=\"This Little USB Necklace Hacks Your Computer In No Time Flat\">This Little USB Necklace Hacks Your Computer In No Time Flat<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Quick! The bad guy\/super villain has left the room! Plug in a mysterious device thatll hack up their computer while an on-screen progress bar ticks forward to convey to the audience that things are working! Its a classic scene from basically every spy movie in history. In this case, however, that mystery device is real.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/super-computer\/this-little-usb-necklace-hacks-your-computer-in-no-time-flat.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[41],"tags":[],"class_list":["post-167923","post","type-post","status-publish","format-standard","hentry","category-super-computer"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/167923"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=167923"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/167923\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=167923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=167923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=167923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}