Home News USB Type-C Security Against Malicious Devices Gets Improved

USB Type-C Security Against Malicious Devices Gets Improved

0
SHARE

The non-profit organization USB-IF has announced that it will release a new USB Type-C authentication program that is going to add another layer of protection against non-compliant USB chargers and other USB malware risks and threats. USB-IF said that the new USB Type-C authentication program is going to roll out during the upcoming future and that it will help devices figure out the authenticity of a USB device, charger or cable.

USB Type-C Authentication Program

What’s great about the newly added layer of security to USB Type-C is the fact that the process of figuring out the authenticity of the USB device, charger or cable happens in an instant. This process starts when the USB device, charger or cable gets connected to a device and it will not allow for power or data to be transferred if the USB device, charger or cable is determined to be malicious.

USB-IF also announced that it’s going to team up with DigiCert. The latter will be in charge of managing the PKI of the USB Type-C authentication program and certificate all authority services for the program. “As the USB Type-C ecosystem continues to grow, companies can further provide the security that consumers have come to expect from certified devices,” said Jeff Ravencraft who is the COO of USB-IF.

Cyber Security

We have to give it to the folks at USB-IF and DigiCert for taking the security of USB Type-C connections into their own hands. Unsafe USB Type-C chargers and other types of devices can be used to make attacks on IT systems, but this is unlikely to happen once the USB Type-C authentication program is rolled out.

Moreover, the USB Type-C authentication program is going to contain the following: a standard protocol of authentication for USB Type-C chargers, devices, cables, and other power sources. Support for authentication via a USB data bus or USB power deliver communications and 128-bit security for all cryptographic methods.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.