What is juice jacking?
Juice jacking is essentially turning an otherwise safe public charging port into an infected one. Hackers can do this using the right hardware and software, and access any device plugged into it. This term was first coined by investigative journalist Brian Krebs in 2011.
How does it work?
As explained above, juice jacking works when you plug your phone, tablet, or laptop into an already infected public USB port. Once you do this, hackers will be able to install malware on the plugged devices, and even steal sensitive data. How the attack works can vary depending on the hacker. There are some possible scenarios though like stealing data, installing malware on your phone, and more.
Hackers can get access to your phone and steal sensitive information like your passwords, and possibly even your banking details. In some cases, hackers can also remotely install malware on your phone. This could also lead to ransomware where you’d have to end up paying the hacker to get access back to your device.
In a more advanced case, hackers could also launch a multi-device attack where all your connected devices are infected with malware. There are different possibilities with all only resulting in the user’s loss.
How to avoid juice jacking?
The best and only way to avoid juice jacking is to not use public charging ports. These are easily available these days in airports, railway stations, shopping malls, and more. It’s also where hundreds and thousands of people are present making it a sweet target location for hackers. It’s advisable to try and carry portable chargers along with you should you face a situation where your phone’s battery might run out.
For all the latest Technology News Click Here
For the latest news and updates, follow us on Google News.