Jan. 13, 2024, 7:28 a.m. | /u/MooseBoys

cybersecurity www.reddit.com

Imagine I have a USB device that I suspect was part of an attempted drop attack. If I wanted to analyze the device without risking being compromised, what tools are there to isolate the device from the computer so I can observe its behavior without compromising the host? I’m aware of electrical isolators that prevent physical damage from over-voltage, but I’m looking to supplement it with some kind of logical isolation. For example, is there a way to quarantine a …

attack aware can compromised computer cybersecurity device electrical host observe tools usb

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Information System Security Engineer 2

@ Wyetech | Annapolis Junction, Maryland

Staff Vulnerability/Configuration Management Security Engineer

@ ServiceNow | Hyderabad, India

Security Engineer

@ AXS | London, England, UK