Review: Kingston’s Encrypted USB3 Flash Drive – DataTraveler Locker+ G3

Kingston DataTraveler Locker G3 USB3 encrypted flash drive review somegadgetguy

Protect your data people!

Like their military grade offerings, this Kingston DataTraveler uses hardware encryption to lock down your data, or nuke the drive if it falls into the wrong hands. Unlike their military grade drives, this one wont break the bank…

Continue reading “Review: Kingston’s Encrypted USB3 Flash Drive – DataTraveler Locker+ G3”

Kingston ships new encrypted USB 3 Flash Drives – Password protect your data with DataTraveler Vault Privacy 3.0

prodDT-DTVP30AV-imgI used to work a government contract. Even though I don’t handle sensitive information anymore I still password protect just about every device I own. I recently reviewed the Kingston DataTraveler 6000, a USB 2 flash drive which uses military grade encryption and anti-intrusion measures to make sure your mobile data can never fall into the wrong hands. I liked it a lot.

Kingston is now introducing a pair of USB 3 protected drives which might be good for businesses or those just looking for a bit more piece of mind with their own personal data. The Vault Privacy 3.0  features hardware based 256-bit AES encryption and password protection. After 10 failed login attempts the drive wipes itself clean making sure your data can’t be accessed.

The Vault Privacy 3.0 Anti-Virus offers all of the same intrusion protections while adding anti-virus protections into the mix courtesy of ESET/ClevX to protect against viruses, worms, rootkits, and other malware.

Both Vaults are available in sizes from 4GB to 64GB, and Kingston is first to market with USB 3 protected drives. Check them out if you’ve been looking for strategies to safeguard your info.

See our review of the Kingston DataTraveler Locker+ G3!

Full PR after the jump.

Continue reading “Kingston ships new encrypted USB 3 Flash Drives – Password protect your data with DataTraveler Vault Privacy 3.0”

Review: Kingston DataTraveler 6000 – Hardcore Military-Grade Encryption for your USB Flash Drive

Kingston datatraveler 6000 review somegadgetguy encrypted usb flash driveThis little guy is pretty brutal.

I used to work for a company which sold gear to Department of Energy facilities, and we dealt with a number of products designed for data protection. In this day and age though, I think we’re all getting a little more concerned with our data security. Honestly a little digital paranoia might not be such a bad thing come to think of it.

Let’s take a quick look at a USB Flash drive from Kingston which aims to lock down your information and protect it from any prying eyes should it fall into the wrong hands.

More info on Kingston Drives: http://www.kingston.com
The DataTraveler 6000 on Amazon

Touch ID fingerprint security already circumvented using low tech methods

apple touch id fingerprint readerThat was fast.

So, iPhone 5S was officially released two days ago, and Touch ID has already been bypassed. It must have taken an army of L337 haxxors running server farms to crack the protection right? Well, unfortunately for us  fans of biometric security, it would seem that the same low tech methods for bypassing still work, even on Apple’s improved fingerprint sensor.

So, as long as you can gain access to someone’s fingerprint, you know those pesky traces of ourselves we leave after touching just about any surface we come in contact with, even potentially ON the fingerprint reader itself, you can spoof someone’s print well enough to fool Touch ID.

From the Chaos Computer Club (the team responsible for the hack):

“In reality, Apple’s sensor has just a higher resolution compared to the sensors so far. So we only needed to ramp up the resolution of our fake… “

Earlier implementations of optical fingerprint readers could even sometimes be fooled by silly putty, so I had very high hopes that Apple’s implementation would solve this problem. The dream of not having to enter complex alpha-numeric passwords on an unforgiving touchscreen isn’t quite realized yet.

Now the process for spoofing your print still requires a little work, making sure you can take a high resolution picture of the print, printing it out, and transferring it to a glue or latex membrane. You have to judge for yourself if the information on your phone is valuable enough for someone to go through this process to try and obtain it. Also, to be fair to Apple, it does require more work to crack than Google’s “Face Unlock” from the front facing cameras on Android handsets.

Unfortunately this will likely strike a blow to corporate and government use, as while it’s still one of the best implementations of biometric security we’ve seen on a mobile device, it’s still entirely defeat-able.

A video demonstrating the exploit can be seen below.

(via CCC)