CHAPTER

3

USB-Based Virus/MaliciousCode Launch

INFORMATION IN THIS CHAPTER

Invasive Species among Us

Anatomy of the Attack

Evolution of the Attack

Why All the Fuss?

Defending against This Attack

We are currently facing a problem of pandemic proportions with viruses and other forms of malicious code being propagated through unexpected avenues. Advanced tactics are making it increasingly difficult to identify the actual source of this mischief. A majority of these threats now appear to be originating from Asia with fluctuating functionality.A While the risk of being exposed to malicious code is nothing new, how you can be exposed to it is swiftly transforming.

In this chapter, we will examine the different types of malicious code, concealment ...

Get Seven Deadliest USB Attacks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.