Reply to post:

Plug and PREY: Hackers reprogram USB drives to silently infect PCs

herman

Essentially, this is just a different delivery method for a trojan horse. Damage will be limited if user and administrator privileges are separated and if MAC or RBAC is used. If everybody would use enterprise versions of their favourite OS, be it Windows, Mac or Linux, then trojan/virus problems will mostly go away.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon