The element of Nohl and Lell’s research that elevates it above the average theoretical threat is the notion that the infection can travel both from computer to USB and vice versa. Any time a USB stick is plugged into a computer, its firmware could be reprogrammed by malware on that PC, with no easy way for the USB device’s owner to detect it. And likewise, any USB device could silently infect a user’s computer.
Afraid of forgetting the password? The drive supports 10 different passwords. For good luck, you might want to make a password consisting of 16 totally random digits and store it in a safe usb access control place. That’s the very key that allows malwares and bugs creep in… because people don’t care… because people don’t want to be accountable… because people want to make systems opaque.
Unless hackers manage to steal the plastic key, accounts with Security Key enabled will almost certainly be secure from compromise. This should be more secure than using a smartphone too, as cyber criminals have infected mobile devices in the past to siphon off security codes. Also USB up to Version 2.0 is based on polling, that means the device can’t send unexpected data, just malformed one to exploit driver and SW bugs. The malware can silently hijack internet traffic too, changing a computer’s DNS settings to siphon traffic to any servers it pleases. Or if the code is planted on a phone or another device with an internet connection, it can act as a man-in-the-middle, secretly spying on communications as it relays them from the victim’s machine. usb protect works on all flavors of 32 bit and 64 bit of Windows 7, Vista, XP, 2008 Server & 2003 Server.