Welcome to Washburn University's Cybersecurity blog. Visit often to get cybersecurity-related news items and tips. If you have any questions, feel free to contact User Services at support@washburn.edu or 785-670-3000.

 Latest Post: What’s the harm in a thumb drive?

Thumb Drives, external hard drives, and all manner of accessories have become ubiquitous throughout the modern world. While they are useful and convenient, it is essential to exercise caution when plugging in unknown USB devices into your computer, and it is important to highlight the potential risks associated with plugging in unknown accessories into your devices. 

What harm can they do? 

  • Malware and Viruses - One of the most significant risks of using unknown USB devices is the potential for malware and viruses. Malicious actors may intentionally infect USB drives with harmful software designed to exploit vulnerabilities in your computer's operating system. When a compromised USB stick is connected to a computer, these malicious programs can spread, corrupt files, steal sensitive data, or grant unauthorized access to your system. 
  • Data Breach and Identity Theft - Plugging an unfamiliar USB drive into your computer can lead to severe consequences such as data breaches and identity theft. Malware on the device may be programmed to collect personal information, including passwords, financial data, or login credentials, which can then be exploited for fraudulent activities or unauthorized access to online accounts. 
  • Unauthorized Access and Backdoors - Unknown USB sticks can also be used to introduce backdoors or gain unauthorized access to your computer or network. Malicious actors may exploit vulnerabilities in your operating system, allowing them to control your computer remotely or use it as a launchpad for further attacks. This can compromise your privacy, lead to data loss, or even result in your computer being used for illegal activities without your knowledge. 
  • Physical Damage - In addition to digital risks, there is also a chance of physical damage when plugging in unknown USB sticks. Some USB drives may be designed to deliver a high voltage shock or damage the USB port, potentially rendering your computer inoperable. This type of attack is less common but highlights the importance of exercising caution with unfamiliar devices. 

What do I do if I find an unclaimed USB Device? 

Any unclaimed USB device, particularly data storage devices like thumb drives and external hard drives, should be secured and turned into ITS at Bennett 104 or to the Washburn University Police Department at Morgan Hall 135. 

Stay vigilant!  

 --WU ITS Information Security    

 www.washburn.edu/cybersecurity 

Previous Posts:
Mar 29

Phishing, what is it and what does it mean for you?

Read the full post →

By: WU ITS Information Security

Category: security

Mar 22

Have you been pwned, Ichabod?

Read the full post →

By: WU ITS Information Security

Category: security

Mar 01

Stay up to date!

Read the full post →

By: WU ITS Information Security

Category: security

Feb 23

Multifactor Authentication, what is it and why should I use it?

Read the full post →

By: WU ITS Information Security

Category: security

Feb 16

Love in the Air, but mind the Phish

Read the full post →

By: WU ITS Information Security

Category: security

Jan 29

Breaking the Loop: Avoiding Shadows

Read the full post →

By: WU ITS Information Security

Category: security

Jan 17

New Contacts; New Friends?

Read the full post →

By: WU ITS Information Security

Category: security

Dec 18

Gift Card Scams

Read the full post →

By: WU ITS Information Security

Category: security

Dec 05

Getting Phishy

Read the full post →

By: WU ITS Information Security

Category: security

Nov 13

Everybody loves free stuff

Read the full post →

By: WU ITS Information Security

Category: security

Nov 08

The Various Biologics of Phish

Read the full post →

By: WU ITS Information Security

Category: security

Oct 23

The many sided world of scamming

Read the full post →

By: WU ITS Information Security

Category: security

Oct 16

Social Media, Where Anything is Possible

Read the full post →

By: WU ITS Information Security

Category: security

Oct 04

Stay Up To Date!

Read the full post →

By: WU ITS Information Security

Category: security

Sep 25

Beware Freeware!

Read the full post →

By: WU ITS Information Security

Category: security

Sep 18

Password Tips

Read the full post →

By: WU ITS Information Security

Category: security

Sep 12

Social Media; Harmless Fun?

Read the full post →

By: WU ITS Information Security

Category: security

Aug 31

Job Scam

Read the full post →

By: ITS Information Security

Category: security

Aug 25

Gift Card Scams

Read the full post →

By: Homer Manila

Category: security

Aug 08

An important update about old Google accounts

Read the full post →

By: AU Information Security

Category: security

Jul 10

Prime Day Scams

Read the full post →

By: ITS Information Security

Category: security

Jun 09

Summer Scams and Shenanigans

Read the full post →

By: Homer Manila

Category: security

Jan 12

Protect Against Smishing Attacks

SMS Attacks and How to Report Protect Against Smishing Attacks

Read the full post →

By: Homer Manila

Category: security

Jan 04

Protect Yourself from Identity Fraud

If you’ve not done it before, freezing your credit is actually very simple to do (and easy to thaw as needed).

Read the full post →

By: Homer Manila

Category: security

Nov 11

Shop Smart and Stay Safe This Holiday Season

Our lovely friends at the Center for Internet Security have some holiday advice on how to keep safe, but the tips are apropos any time of year! Come see what they have to say.

Read the full post →

By: Homer Manila

Category: security, General


Archives

2024 2023 2022