AGL 40.00 No Change ▼ 0.00 (0%)
AIRLINK 127.04 No Change ▼ 0.00 (0%)
BOP 6.67 No Change ▼ 0.00 (0%)
CNERGY 4.51 No Change ▼ 0.00 (0%)
DCL 8.55 No Change ▼ 0.00 (0%)
DFML 41.44 No Change ▼ 0.00 (0%)
DGKC 86.85 No Change ▼ 0.00 (0%)
FCCL 32.28 No Change ▼ 0.00 (0%)
FFBL 64.80 No Change ▼ 0.00 (0%)
FFL 10.25 No Change ▼ 0.00 (0%)
HUBC 109.57 No Change ▼ 0.00 (0%)
HUMNL 14.68 No Change ▼ 0.00 (0%)
KEL 5.05 No Change ▼ 0.00 (0%)
KOSM 7.46 No Change ▼ 0.00 (0%)
MLCF 41.38 No Change ▼ 0.00 (0%)
NBP 60.41 No Change ▼ 0.00 (0%)
OGDC 190.10 No Change ▼ 0.00 (0%)
PAEL 27.83 No Change ▼ 0.00 (0%)
PIBTL 7.83 No Change ▼ 0.00 (0%)
PPL 150.06 No Change ▼ 0.00 (0%)
PRL 26.88 No Change ▼ 0.00 (0%)
PTC 16.07 No Change ▼ 0.00 (0%)
SEARL 86.00 No Change ▼ 0.00 (0%)
TELE 7.71 No Change ▼ 0.00 (0%)
TOMCL 35.41 No Change ▼ 0.00 (0%)
TPLP 8.12 No Change ▼ 0.00 (0%)
TREET 16.41 No Change ▼ 0.00 (0%)
TRG 53.29 No Change ▼ 0.00 (0%)
UNITY 26.16 No Change ▼ 0.00 (0%)
WTL 1.26 No Change ▼ 0.00 (0%)
BR100 10,000 Increased By 116.4 (1.18%)
BR30 31,002 Increased By 402.1 (1.31%)
KSE100 94,192 Increased By 836.5 (0.9%)
KSE30 29,201 Increased By 270.2 (0.93%)

You may have heard that USB flash drives you receive as give-aways are a security risk. But e-cigarettes and all other USB gadgets, ranging from mini fans to cup warmers, may also pose a similar threat, a European anti-hacker agency is warning.
For security reasons, it is preferable to charge or operate such devices through a wall socket via a USB charger, not plug them into your laptop, says the German Office for Information Security (BSI).
Most malicious USB gadgets have been rigged so that the computer thinks they are keyboards, since keys often require extensive access rights to function.
It's brilliantly effective way to plant malicious software on computers. A virus could be set up to record and export all your keystrokes including sensitive data such as passwords.
If you frequently work with USB flash drives or USB devices from all kinds of sources, you can use the G Data tool USB Keyboard Guard for constant monitoring in the background.
If a new keyboard is detected, the software will block it and display a warning. The user can subsequently decide whether to approve the keyboard, if it is indeed a keyboard, or block access if it's a fan or cup warmer with a split personality.
The tool will remember each legitimate device once it is approved.

Copyright Deutsche Presse-Agentur, 2016

Comments

Comments are closed.