Categories: News

Computer Forensics Tests Reveal Fingerprint USB Drives With Hardware Encryption Are Not Secure

Today’s news article on computer forensics is about hacking encrypted Fingerprint USB drives. The encryption being talked about is AES 256 hardware encryption, which til date use to be considered a very reputable and safe standard in the world of digital and computer forensics. You must have seen online advertisements about the most secure hardware based AES 256 bit encrypted Fingerprint USB drives from popular brand names such as Kingston USB and SanDisk USB, these are the ones that have been found to be completely vulnerable by a computer forensic company based off Germany called SySS. Their tests show a major design vulnerability that can decrypt the present information on the thumb drive.

SySS is a German company that specializes in Computer and IT Forensics. In a nutshell how they are able to read encrypted data is very simple, it does not even require to put in your password. When a user enters their correct password on the key to decrypt the information, the hardware algorithm passes through a particular string of information or characters to the device storage system which presents the information to the user in clear text. The flaw however comes in with the fact that this “String” passed through after a valid session for any password, is always the same!

SySS used their computer forensic know how to interpret this “string” and were able to demonstrate how they can pass this on to the hardware device and get decrypted information every time. There are two White Papers published by the company on their website that explains this much in depth. This discovery has major implications on Corporate and Law Enforcement officials which often carry sensitive information on such encrypted devices. As a matter of fact, there is school of thought around which is debating if law courts will now accept hardware encrypted thumb drives as “unaltered” secure evidence.

techfeatured

Recent Posts

The Benefits of Partnering with an IT-Managed Service Provider for Your Business

Table of Contents Introduction to IT Managed Service Providers Why Outsource IT Management? Cost-Effective Solutions…

2 months ago

Choosing the Right Thresholds for Your Home: A Comprehensive Guide

Key Takeaways: The importance of selecting the correct thresholds for different areas in your home…

4 months ago

Innovative Railing Gate Solutions for Modern Homes

Key Takeaways: The variety of railing gate designs can significantly enhance the aesthetic appeal of…

4 months ago

How To Choose the Perfect Vehicle for Extended Commutes

For many, commuting is an unavoidable part of daily life. But when that commute extends…

4 months ago

The Future of Mobility: Innovations in Automotive Technology

When you're on the road, you want to feel safe, comfortable, and like you have…

5 months ago

Clean Air Starts at Home: Tips for Maintaining Indoor Air Quality

Key Takeaways: Understanding the significance of indoor air quality. Identifying common pollutants in your home.…

6 months ago