Service receive & sending SMS

New USB Type-C Helps Protect Your Devices

1396   |     /   Security

New USB Type-C Helps Protect Your Devices
You've probably accumulated a box full of USB drives, cables, and chargers over the years. Although they certainly began to charge your devices better and transfer files faster, in reality they did not become more secure. That will change soon.

In order to pass the verification of identification on any site with us, you can find free services for receiving SMS messages to get a verification code for a virtual number.

USB-IF, the industry group responsible for developing and promoting USB standards, has announced the USB Type-C authentication program. Authentication, according to a USB-IF press release, "allows host systems to protect against incompatible USB chargers and reduce the risks of malware or hardware on USB devices."

In case you did not know, the USB ports on your devices pose a very real security risk. Hackers can crack publicly charged chargers and use them to infect phones and tablets with malware. USB sticks may come with malware that was quietly pre-loaded during production. This happens more often than you think. IBM distributed the infected disks to its customers twice.

USB-C authentication will make it very difficult for an attacker to use these techniques to successfully attack your devices.

For example, your phone may search for a specific unmodified signature before establishing a connection with a charger. If everything looks good, the connection will be established and current may begin to flow. If something looks blurry, your phone will refuse to connect.

Authentication can protect your laptop or desktop PC from malicious USB drives in the same way. If the USB-C signature on the drive was tampered with or not recognized, the computer will not allow the connection.

A security update is certainly welcome, but there may be one rather annoying catch. Theoretically, manufacturers can bind their devices to their own cables and chargers. It all comes down to the fact that individual companies intend to introduce USB Type-C identification ..

Ultimately, this may be a small price for additional protection. Since USB-IF positions Type-C as the “single connector that controls them all,” it’s very important to implement powerful security features that can limit the use of criminal hackers.

Similar news

Google Shields Chromebook from USB Attacks

The ubiquity of USB has made it a common cyber attack vector. The criminal can approach the car, calmly insert the USB flash drive into the PC without causing suspicion, and damage the entire network. It only takes a few seconds, but the damage done may be permanent.

How to secure Internet devices

We are all connected. This is not just a warm and fuzzy expression of feelings, it is the reality of the digital world in which we live. This connection provides great benefits, but it can also make us vulnerable to those who prey on any identified weaknesses. Hackers and other attackers target unprotected networks to attack and steal our personal devices for use in criminal activities.

How to evaluate and improve the security of your site

There was a time when people and companies simply abandoned sites, hoping that no one would hack their contents or install malware on the site.


This is not only a service for receiving and sending SMS messages to virtual numbers, but also a tutorial on user safety in the modern world, the latest developments in IT, social media security, fresh programs and lessons that simplify our lives. So are other issues encountered by the average user. In simple words, each user will find for themselves something interesting or answers to their questions.

SIMonline © 2018 - 2024

All rights reserved