Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

1/13/2010
02:11 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Kingston Digital To Replace Affected Secure USB Flash Drives With Upgraded Security Architecture, New Drives

Users of DataTraveler BlackBox, DataTraveler Secure - Privacy Edition, and DataTraveler Elite eligible for replacement unit

FOUNTAIN VALLEY, Calif., Jan. 13 /PRNewswire/ -- Kingston Digital, Inc., the Flash memory affiliate of Kingston Technology Company, Inc., the independent world leader in memory products, today announced it will replace certain secure USB Flash drives with new units designed with an improved security architecture. The Kingston drives affected are the DataTraveler BlackBox (DTBB), DataTraveler Secure - Privacy Edition (DTSP) and DataTraveler Elite - Privacy Edition (DTEP). Kingston is offering its customers the following: a FIPS-certified replacement for the DTBB; and the DataTraveler Vault - Privacy Edition for the DTSP and DTEP.

Kingston was notified in December by a third-party security consulting firm that the DataTraveler BlackBox, DataTraveler Secure - Privacy Edition and DataTraveler Elite - Privacy Edition contained a potential security flaw. Kingston believes the best solution is to replace those potentially affected units.

"We have decided the best way to address this problem is to offer our customers replacement units that incorporate newer and stronger security architecture," said John Holland, vice president, U.S. sales, Kingston. "Since we were first notified of the potential hack, we have concluded that exchanging drives is the proper solution for our customers."

Customers who own one of the affected drives should contact Kingston's Customer Service Department for full details of our standard return process. For the customer service phone number in your region, visit www.kingston.com/driveupdate.

About Kingston Digital, Inc.

Kingston Digital, Inc. ("KDI") is the Flash memory affiliate of Kingston Technology Company, Inc., the world's largest independent manufacturer of memory products. Established in 2008, KDI is headquartered in Fountain Valley, California, USA. For more information, please visit www.kingston.com or call 800-337-8410.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-26854
PUBLISHED: 2021-03-03
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078.
CVE-2021-26855
PUBLISHED: 2021-03-03
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078.
CVE-2021-26857
PUBLISHED: 2021-03-03
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078.
CVE-2021-26858
PUBLISHED: 2021-03-03
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-27065, CVE-2021-27078.
CVE-2021-27065
PUBLISHED: 2021-03-03
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27078.