Whichever type of modern smartphone you are using – whether it’s an Android device, an iPhone, or a Blackberry – it’s a common feature in all phones and it’s the power to pass the power supply and data flow from the same cable. Even though you now use standard USB minibus connections or cable which comes with Apple phones, the same situation is: the cable used to recharge your phone’s battery is the same cable you are using to transfer and sync your data.
This setup provides an approach vector for the malicious user to access your phone during the charging process; the data/power on the same cable; To get the USB data/power cable injected in order to illegally access the phone data and/or identify the malicious code as a juke jacking in the device
How can I avoid this? Instead of charging your phone using a third-party system, only the most effective caution center. Here are some tips to help you avoid using a public kiosk charger:
Turn off most of your devices: Make a habit of charging your phone and office with your phone when you are not actively using it.
Take personal charger: Chargers have become very small and portable from USB cables to power bank. Get one and throw it in your bag, when you use a power bank, you can charge it anytime on your phone while in the office or whenever you go.
Run backup battery: If you are not eager to bring an extra charger or a power bank, you can choose to have a full spare battery if your device has a removable battery
Lock your phone: When your phone is locked as accessible as an access to the PIN or equivalent passcode, your phone cannot be connected to the device connected to it.
Turn down the phone: This technique works only on a model by model, as some phones run down, allowing full USB circuits to still be in the power store and the flash store in the device.
Use only USB cable power: These cables are missing two stars that are needed for data transmission and there are only two stars for the remaining power transmission. They will charge your device, but the data transfer has become unbearable.
The smallest details like charging from your phone kiosk charger can also affect the security of your device. There are many options for using third-party systems, but ultimately the best protection against compromised mobile devices is awareness. Want to know more about today’s safety and threats? Contact me today and see how I can help.
Interview With ZeeNews on Smartphone Juice Jacking
In this type of ‘Cyber Stocking’ the victim is harassed through the Internet.
Earlier, violence was being done by women on the basis of dowry, family violence, rigging, sexual harassment at work, and persecution by unilateral love, and now it has included internet harassment.
The internet continues to be the type of sending messages before sending or sending obscene messages to women; But now email has become a big medium for this. Blackmailing, threatening or attempting to engage in pornographic intercourse especially for girls, such type is being done more frequently than ever from emails. In most cases, the person who is close to or acquainted with the woman is familiar with it. However, this group is making ‘cyber stockings’ by creating fake accounts.
In this type of ‘cyber stocking’ the victim is harassed through the Internet. In such cases, making phone calls, doing bad things against a person or writing a sentence on his / her body. Most of the time, the culprit in this manner is a disloyal, one-sided love, but at times the humiliated person has done such a thing even with the feeling of vengeance. In this case, the victim’s personal information, family information, phone number and the victim’s diary can be collected by collecting information about it and using that information to hurt the victim. This type of personal information has also been posted on the Internet’s sex service or dating services website