0

Chromebooks are inherently secure machines—they’re essentially impervious to viruses and similar threats found on other machines. The one primary weakness is a physical one, but Google is making moves to fix that, too.

There’s a malicious USB tool called a Rubber Ducky that emulates a keyboard and has the capability of injecting up to 1000 keystrokes per minute onto any machine which it’s inserted. As long as a would-be wrongdoer has physical access to your computer, all they need to do is insert the USB key and let it do the rest.

Since this is a physical weakness, that means Chromebooks are just as susceptible the Rubber Ducky attacks as other machines. But Google is working on a new feature for Chrome OS called USBGuard that will eliminate this threat by blocking access to USB ports on locked Chromebooks.

While this is still a work in progress, it appears that the feature won’t simply block access to USB ports across the board, but instead keep ports that are currently in use alive. So, if you’re transferring files from a USB drive and the ‘book goes to sleep, the transfer will continue. Similarly, users will be able to whitelist specific devices—like mice and keyboards, for example—so they’re always available regardless of the Chromebook’s lock state.

The USBGuard flag is already available on the Chrome OS Canary channel for those who live dangerously but should be available to more users on other channels in the coming weeks or months.

ChromeStory via Engadget


Post a Comment Blogger

We welcome comments that add value to the discussion. We attempt to block comments that use offensive language or appear to be spam, and our editors frequently review the comments to ensure they are appropriate. As the comments are written and submitted by visitors of The Sheen Blog, they in no way represent the opinion of The Sheen Blog. Let's work together to keep the conversation civil.

 
Top