Unless you were born well before the internet boom of 1991 (sorry grandma) I’m sure you are aware of the dangers of accessing the internet and the threats we face from viruses, worms, Trojan horses and spyware. No, these aren’t a sequence of words describing symptoms of the flu, a farm yard animal or a fancy dress outfit; but self-replicating, malicious programmes designed to cause destruction to your computer.
If you aren’t in-fact aware, I would recommend you consider taking a crash course before your device does!
For those that are conscious of the dangers and vulnerability of accessing content online and the threats posed – well done!!… BUT I bet you haven’t stopped to consider the risks related to and associated with external storage devices and physical hardware. I’m talking about CD’s, SD cards, USB pens and floppy Disks (If you are still using a ‘floppy’ hang your head!).
These all sound pretty safe right? And why wouldn’t they be?
These devices are personal! We access them every day! We trust them!
Our Survey says… EEH AWH!
A, B or C…
Picture this: You’re sitting at your computer and someone you know approaches you and asks can they charge their phone through your USB port? Do you:
A) Let them connect to your device
B) Awkwardly refuse them access
C) Run away as fast as you can
We all know the answer is A. Unless you are a terrible friend or get nervous around people you will most likely give them access to charge their phone, living up to the name of the good Samaritan that you are…
A word of warning…
Next time you’re placed in that position take care!…
Cyber-security experts have dramatically called into question the safety and security of using USB to connect devices to computers, with latest research demonstrating a new level of threat – where a USB device that appears completely empty can still contain malware (the harmful stuff), even when formatted.
USB has become the standard method of connecting devices to computers due to its small size, speed and ability to charge devices providing a simple way to share large files between two computers, but its vulnerability can be used to hide attacks in any kind of USB-connected device – such as your smartphone.
The moral of the Story…
If you are so intrigued that you wish to find out more visit this link: http://www.bbc.co.uk/news/technology-28701124
glistrr is a check in system for events. Geared towards event promoters and venue owners, glistrr aims to make your guest check in experience as efficient as possible, while at the same time affording management of a wealth of data that can be used for future marketing and management of their events.
We proudly offer a free, no obligation demo of the glistrr system. To avail of this demo, please get in touch.