USB drives with built in antivirus launched 0 639

antivirus USB drives

ESET is set to develop a new range of secure USB flash drives that will come with in-built antivirus.

The new encrypted USB drives will feature built-in antivirus protection with built-in ClevX Drive Security powered by ESET, to keep contents of the USB flash drives safe and malware free, and prevent malware from spreading via removable media.

According to ESET East African Area Manager, Bruce Donovan, data protection is essential for businesses to keep their data safe due to increasing regulatory pressure as well as the need to safeguard their customers’ information in the highest possible way.

“We hope that this antivirus protection will better protect the end users data and devices from viruses and malware which can be transmitted by USB drives both at home and in offices,” said Mr. Donovan.

ESET has partnered with Swedish tech firm CTWO Products AB to come up with the ClevX DriveSecurity USBs that uses ESET’s Nod32 antivirus engine to detect and eliminate viruses, spyware, trojans, worms, rootkits, adware and other internet threats before they can be transmitted onto portable drives.

ClevX operates from the drive itself, for speed and convenience, with no need to install software onto a host computer.

CTWO Products AB vice president of sales and marketing Mr. James Baker said that today’s workers move from home to office and computer to computer frequently, and USB flash drives are a common means to transfer data between machines, which can lead to the rapid spreading of malware, unless they are protected.

“Our combined secure drive solution with ClevX and ESET provides a multitude of layers to protect users’ data and computers from potential data loss and infection. It also addresses the issue of portable media being a common source of malware infection, said Mr. Baker.

Previous ArticleNext Article

Flaws in email encryption revealed 0 572

email encryption

A team of 8 academics have discovered weaknesses in OpenPGP and S/MIME encryption protocols which could lead to the plain text of encrypted emails being exposed to attackers. The academics have named these flaws “EFAIL”.

Insights from cryptography expert Bruce Schneier explained that “[t]he vulnerability isn’t with PGP or S/MIME itself, but in the way they interact with modern e-mail programs.”

To be able exploit the weaknesses, you would first need to access the end-to-end-encrypted email message. This could be by way of stealing it from a compromised account or by intercepting its path. Following this, the attacker would need to alter the email, adding a custom HTML code and then sending this new version onto the victim. The victim’s email client decrypts the email and is tricked by the malicious code into sending the full plaintext of the emails to the attackers. Even messages sent years ago are vulnerable.

The team said that their proof-of-concept exploit has been shown to be successful against 25 out of 35 tested S/MIME email clients and 10 out of 28 OpenPGP clients. The flaws affect email applications such as Apple Mail with the GPGTools encryption plug-in, Mozilla Thunderbird with the Enigmail plug-in, and Outlook with the Gpg4win encryption package. The academics said that, in keeping with the principles of responsible disclosure, they have reported their findings to all email providers concerned.

Time to change your Twitter password 0 733

Twitter Password

An internal bug exposed the passwords of an undisclosed number of the more than 330 million Twitter users.

Twitter CTO Parag Agrawal announced that it was a “bug that stored passwords unmasked in an internal log”. He went on to state “we have fixed the bug and our investigation shows no indication of breach or misuse”.

The Social Media platform are insisting that there is no sign of danger and that there is no reason to believe that the passwords were exposed outside of the organisation. However, they are still advising users to change their Twitter passwords and those of any other online service using the same password.

Some additional password tips from Twitter include enabling two-factor authentication and also using a password manager to create a strong and unique password for every individual online service.