<div dir="ltr">"It’s been just two months since researcher Karsten Nohl demonstrated an attack he called BadUSB to a standing-room-only crowd at the Black Hat security conference in Las Vegas, showing that it’s possible to corrupt any USB device with insidious, undetectable malware. Given the severity of that security problem—and the lack of any easy patch—Nohl has held back on releasing the code he used to pull off the attack. But at least two of Nohl’s fellow researchers aren’t waiting any longer."<br clear="all"><div><br></div><div><a href="http://www.wired.com/2014/10/code-published-for-unfixable-usb-attack/">www.wired.com/2014/10/code-published-for-unfixable-usb-attack/</a><br></div><div><br></div>-- <br><div dir="ltr"><div><br></div><div>Mark Kelly</div><div>mark AT vceit DOT com</div><div><a href="http://vceit.com" target="_blank">http://vceit.com</a></div><div><br></div><div><i>I love the sound of people's voices after they stop talking.</i></div><div><br></div><div><br></div></div>
</div>