E-Cigarettes Can Hurt Your Computer

E-Cigarettes

Yet more evidence that smoking is bad for you: A brand of e-cigarettes manufactured in China, has been found to carry malicious software that can be implanted into a computer when plugged into a USB port for recharging.

E-cigarettes are in actual fact, electronic vaporizers that heat a liquid solution into an aerosol mist that offers the sensation, nicotine and flavorings of tobacco cigarettes, supposedly without its harmful effects, although being a new technology, its risks as a nicotine replacement product are as yet largely uncertain. The heating element can be charged through a computer’s USB port, and this is where the malware was released.

The story, detailed on Reddit, points out that an executive at a “large corporation” found his computer had been infected with malware from an undetermined source. An extensive IT scouring showed his computer’s antivirus and anti-malware protection was fully up-to-date, and it was only after he was questioned about recent changes to his lifestyle that mention of the e-cigarettes was made. They had been purchased on eBay for $5.

A report from The Hacker News quotes Trend Micro security consultant Rik Ferguson as saying, “Production line malware has been around for a few years, infecting photo frames, MP3 players and more.” The report goes on to highlight how in 2008, a photo frame produced by Samsung shipped with malware on the product’s install disc.

Although these incidences are reasonably rare, they highlight a permanent reality that hackers are constantly searching for ways to exploit any electronic device to serve Malware to a poorly protected network, and USB ports become one of those overlooked areas – a simple charging or connection port that for most users has a limited, yet convenient function.

The Hacker News article describes the malware app BadUSB that was recently able to “spread itself by hiding in the firmware meant to control the ways in which USB devices connect to computers.” Rik Ferguson is quoted as suggesting “a very strong case can be made for enterprises disabling USB ports, or at least using device management to allow only authorised devices.

By Steve Prentice

Chris Collins

Why Cloud Technology is a Smart Business Move for Higher Education

Higher Education Technology Cloud technology is not just for the world of big business. A growing number of higher education institutions are also embracing the cloud’s many advantages, especially for its data gathering and analytics ...
David Loo

The Long-term Costs of Data Debt: How Inaccurate, Incomplete, and Outdated Information Can Harm Your Business

The Long-term Costs of Data Debt It’s no secret that many of today’s enterprises are experiencing an extreme state of data overload. With the rapid adoption of new technologies to accommodate pandemic-induced shifts like remote ...
Cybersecurity Maturity Model Certification (CMMC)

The Rise Of The Corporate VPN

The Rise Of The Corporate VPN Over the past few years, VPNs have become increasingly widely used by the general public. Initially, they were used exclusively by the tech-savvy and privacy obsessed, but as the ...
Gary Bernstein

AWS General Release of Amplify Flutter

The AWS General Release of Amplify Flutter The Amazon Web Service has announced that the Amplify Flutter is now generally available in a way to help make flutter apps easier and more accessible. According to ...
Martin Mendelsohn

Of Rogues, Fear and Chicanery: The Colonial Pipeline Dilemma and CISO/CSO Priorities

The Colonial Pipeline Dilemma The Colonial Pipeline is one of a number of essential energy and infrastructure assets that have been recently targeted by the global ransomware group DarkSide, and other aspiring non-state actors, with ...

PROXY SERVICES

The CloudTweaks technology lists will include updated resources to leading services from around the globe. Examples include leading IT Monitoring Services, Bootcamps, VPNs, CDNs, Reseller Programs and much more...

  • Smartproxy

    Smartproxy

    Smartproxy is a rising star in the constantly growing proxy market. Smartproxy offers awarded customer service, impressive performance, and is serious about your anonymity (yes, cybersecurity matters). The latest features developed by Smartproxy are 30 minute long sticky sessions and Google Proxies. Rumor has it, the latter guarantee 100% success rate

  • Bright Data

    Bright Data

    Bright Data’s network is one of the most robust of its kind globally. Here are its stark advantages: Extremely stable connection for long sessions (99.99% uptime guaranteed). Free to integrate with our Proxy Manager which allows you to define custom rules for optimized results. Send unlimited concurrent requests increasing speed, cost-effectiveness, and overall efficiency.

  • Rsocks

    Rsocks

    RSocks team offers a huge amount of residential plans which were developed for plenty of tasks and, most importantly, has been proved to be quite efficient. Such variety has been created on purpose to let everyone choose a plan for a reasonable price, online, rotation and other parameters.

  • Storm Proxies

    Storm Proxies

    Storm Proxies' network is optimized for high performance and fast multi-threaded tools. You get unlimited bandwidth. No hidden costs, no limits on bandwidth. Try Storm Proxies 100% Risk Free. If you are not happy with the service email us within 24 hours of purchase and we will refund you.