Safely and securely use memory sticks
Authored by a Symantec employee
You may have noticed growing reports in the media about the dangers of using USB memory sticks. It is true, they are susceptible to being exploited like everything else, however, and these exploits aren’t terribly easy to carry out by hackers. Mostly because an attacker needs physical access to your computer in order to infect it.
Help protect your digital life on your devices.
Are you afraid of losing your personal information or all the precious things on your computer? Get comprehensive protection with Norton Security Deluxe across all your devices – up to 5 PCs, Macs, smartphones or tablets.
Create an account today and try it free for 30 days on up to 5 of your devices.
What Can a "Bad" USB Stick Do?
A malicious device can install malware such as backdoor Trojans, information stealers and much more. They can install browser hijackers that will redirect you to the hacker’s website of choice, which could host more malware, or inject adware, spyware or greyware onto your computer. While the ramifications of these threats can range from annoying to devastating, you can stay protected from these threats.
Staying Protected is Easier Than You Think
- Don’t plug unknown flash drives into your computer- this is one of the most important pieces of advice you should follow. This is a tactic used in social engineering, where the attacker relies on the curiosity of people. If you see a USB stick lying out in open, public places, do NOT plug it into your computer to see what’s on it.
- Use secure USB drives. Some newer models have safety features such as fingerprint authentication that help protect the device from hackers.
- Don’t use the same flash drives for home and work computers, as you could run the risk of cross contaminating your computers.
- Be careful where you purchase your USB drives from, as some shady third party manufacturers are known to manufacture these devices with malware on them. Always buy your flash drives from reputable, well known manufacturers as well as sellers.
- Keep the software on your computer up to date. No one likes to do them, but software updates are crucial to the security of your computer, as they patch known vulnerabilities.
- Make sure to keep your Internet security software up to date. In the event you accidentally use a device that contains malware, you’re protected. If you don’t have Internet security software, you should get it, as it can protect you from a host of issues other than just USB malware.
Isn't it time to upgrade your security?
Upgrading to new devices and software can often mean downgrading your privacy and security. It’s time to take your security seriously. Download the full version of Norton Security Deluxe free for 30 days, and test-drive it on up to 5 of your devices – PCs, Macs, smartphones or tablets.
Create an account today and be up and running in minutes.
Disclaimers and references:
Symantec Corporation, the world’s leading cyber security company, allows organizations, governments, and people to secure their most important data wherever it lives. More than 50 million people and families rely on Symantec’s Norton and LifeLock comprehensive digital safety platform to help protect their personal information, devices, home networks, and identities.
Copyright © 2019 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Norton, Norton by Symantec, LifeLock, and the LockMan Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Microsoft and the Windows logo are trademarks of Microsoft Corporation in the United States and/or other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.