USB-C to get security-focussed authentication program

In an attempt to battle malicious devices, the program aims to stop infection at the point of connection

USB Implementers Forum (USB-IF) has announced the launch of its own USB-C authentication program which provides an added layer of security for host systems before opening themselves up to data or power transfer via USB-C.

The program's features include a standard protocol for authenticating certified USB Type-C chargers, devices, cables and power sources, as well as support for authenticating over either USB data bus or USB Power Delivery communications channels.

It will also support 128-bit cryptographic security among other features, all of which will help reduce the likelihood of criminals exploiting USB connections, according to the non-profit organisation.

"USB-IF is excited to launch the USB Type-C Authentication Program, providing OEMs with the flexibility to implement a security framework that best fits their specific product requirements," said USB-IF President and COO Jeff Ravencraft. "As the USB Type-C ecosystem continues to grow, companies can further provide the security that consumers have come to expect from certified USB devices."

According to USB-IF, it selected DigiCert to manage the PKI and certificate authority services for the USB Type-C Authentication Program. DigiCert is a leading security provider for TLS/SSL, PKI and IoT solutions.

"DigiCert is excited to work with USB-IF and its CA Program Participants from the industry at large to provide the technical expertise and scale needed for the USB Type-C Authentication Program, and we look forward to implementation," said Geoffrey Noakes, vice president of IoT Business Development at DigiCert.

On Wednesday it was revealed that Google's ChromeOS would now provide the option to disable USB ports when the screen is locked to combat the issue of criminals plugging malicious devices into a machine and bypassing login screens.

These physical attacks, known as "Rubber Ducky" attacks, involve inserting a USB drive containing with a malicious payload which then tricks the computer into thinking its a harmless keyboard before unloading malicious code onto the system.

A similar string of attacks also struck select Eastern European banks last month in a cyber heist thought to have earned criminals tens of millions of pounds.

The attacks were carried out using Bash Bunnies, a program loaded onto USB devices such as the Raspberry Pi and then connected to USB sockets in meeting rooms located in the banks' buildings. Criminals were said to have posed as contractors or job applicants to gain physical access to machines before exploiting the network.

Featured Resources

Shining light on new 'cool' cloud technologies and their drawbacks

IONOS Cloud Up! Summit, Cloud Technology Session with Russell Barley

Watch now

Build mobile and web apps faster

Three proven tips to accelerate modern app development

Free download

Reduce the carbon footprint of IT operations up to 88%

A carbon reduction opportunity

Free Download

Comparing serverless and server-based technologies

Determining the total cost of ownership

Free download

Most Popular

What should you really be asking about your remote access software?
Sponsored

What should you really be asking about your remote access software?

17 Nov 2021
How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

24 Nov 2021
Sabbath hackers are targeting US schools and hospitals
ransomware

Sabbath hackers are targeting US schools and hospitals

29 Nov 2021