Site icon Ingenio

Why you shouldn’t use public charging kiosks

Security Sep02 A PH

Security Sep02 A PH

Smartphones have become a vital part of modern life. And as we spend more time on these gadgets, the likelihood of needing to recharge them while on the go increases. When your phone’s juice runs out and you’re nowhere near your charger, a public charging kiosk can look pretty promising. But what you might not know is that recharging phones at public charging stations can make you a victim of juice jacking.

What is juice jacking?

While newer phones can be charged wirelessly, older models still need power cords to power up their batteries. This charging method has one dangerous flaw: the cable used for charging can also be used for transferring data. Cybercriminals can exploit this flaw to commit juice jacking, or the act of using the USB data/power cable to illegitimately access phone data and/or inject malicious code into a device.

Juice jacking often happens at public charging kiosks. When you charge your phone, it is paired with a computer concealed within the charging stand. The computer can then access all of the information on your device, including personal data such as your address book, notes, photos, music, SMS database, and keyboard cache. It can even initiate a full backup of your phone, which can be accessed by the hacker wirelessly anytime.

Apart from stealing your data, cybercriminals can also inject malware into your phone through a public USB hub. All it takes is a minute of being plugged into a public charger for your phone to be infected by malware. Once infected, your phone can be prompted to display ads, download apps, or view web pages without your authorization.

How to avoid juice jacking

The most effective precaution against juice jacking is simply not charging your phone using a third-party system. Here are some tips to help you avoid using a public kiosk charger:

Technology threats are all around us. Even something as trivial as powering your phone in a public kiosk station can compromise your device’s security. If you want to learn more about how to protect your gadgets from today’s security threats, don’t hesitate to call us. Our technology experts are happy to help.

Published with permission from TechAdvisory.org. Source.
Exit mobile version