Hacker News new | past | comments | ask | show | jobs | submit login

I'm not completely sure, but the vulnerability resides in the fact that an usb device can mimic any other type of device. However if all devices are ignored by the system then it won't matter what evil usb devile you insert: it will be ignored just like all the legitimate usb devices.

So yes, if your company blocks absolutely all usb devices than you're probably safe.




Since the company does it at the OS level it is still vulnerable to the "boot-loader" attack.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: