Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

11/26/2013
03:10 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Preventing Security Breaches Caused By Audio Devices

Belkin Secure Headset Adapter designed to securely connect analog audio devices to computers

PLAYA VISTA, CA – Belkin, a trusted leader of technology solutions for office, classroom, IT infrastructure, and mobile environments, today announced its release of the Belkin Secure Headset Adapter, the newest in the company's line of award-winning secure products. The adapter is designed to securely connect analog audio devices to computers in a secure environment with ease and simplicity.

For Internet-connected computers located inside high security zones where classified calls and meetings take place, using audio devices may cause a security breach if not properly protected. Such computers are often used with headphones, speakers, or microphones to enable conference calls. These Internet-connected computers can be compromised by hackers to remotely enable their microphones or headsets, using them to "listen" in to surrounding environment.

To avoid these problems, Luis Artiz, director of product management, Business Division, Belkin International, said that the Belkin Secure Headset Adapter is the only solution available today that enables the use of analog audio devices in a secure environment. "It is the perfect security solution where classified discussions are held in an environment where computers are present," said Artiz. "It should be used whenever analog audio devices are used--in boardrooms, offices, defense, the military, and other areas where sensitive conversations take place."

The Belkin Secure Headset Adapter works by using an audio diode to assure unidirectional audio flow, preventing the headphones from being used as a microphone. A time-limited activation button disconnects the microphone when it is not in active use, making it impossible to keep the microphone open when a call is not in progress. The user must periodically press the button to extend the audio call if needed.

The Belkin Secure Headset Adapter also includes many additional security features:

• An anti-tampering mechanism, which permanently disables the audio adapter upon detecting any tampering

• OTP protected firmware stored on a non-programmable ROM

• Complete isolation of the audio switch from the computer

• High-quality audio via active diode circuitry, which assures audio passes in the required direction with no distortion or attenuation

• Easy integration and operation, with no USB Interface, no changes to existing audio equipment, and no use of unsecured USB audio interface.

The adapter, which weighs just over half a pound, supports all AC'97 CODECS on-board or audio cards, and HD Audio Codecs. It also supports a wide range of Belkin Secure desktop products, including KVM and KM switches.

Belkin delivers the necessary components for workstation security, as well as every essential accessory and peripheral device to provide a complete, efficient, productive workstation that meets the demands of government use. For more information visit: Belkin Government.

Tweet this: @belkinbusiness releases secure headset adapter for analog devices to thwart #cyberattacks and #securitybreaches

About Belkin Business

Belkin Business, a division of Belkin International, offers technology solutions for office, classroom, IT infrastructure, and mobile environments. A proven technology leader for more than 30 years, organizations worldwide trust Belkin for its unwavering commitment to product quality, and expertise in creating solutions designed to address customer requirements in business, government and education. With a global supply chain and broad provider network, Belkin commands a purchasing power that delivers greater value and unparalleled execution advantages to customers. The company's line of commercial products are available through Belkin's global network of distributors and resellers. Headquartered in Playa Vista, California, the company is represented in more than 25 countries and can be found on the Web at http://www.belkin.com/us/business/enterprise.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20934
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
CVE-2020-29368
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
CVE-2020-29369
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
CVE-2020-29370
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
CVE-2020-29371
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.