Smart Phone Juice Jacking

Whichever type of modern smartphone you are using – whether it’s an Android device, an iPhone, or a Blackberry – it’s a common feature in all phones and it’s the power to pass the power supply and data flow from the same cable. Even though you now use standard USB minibus connections or cable which comes with Apple phones, the same situation is: the cable used to recharge your phone’s battery is the same cable you are using to transfer and sync your data.

This setup provides an approach vector for the malicious user to access your phone during the charging process; the data/power on the same cable; To get the USB data/power cable injected in order to illegally access the phone data and/or identify the malicious code as a juke jacking in the device

How can I avoid this?
Instead of charging your phone using a third-party system, only the most effective caution center. Here are some tips to help you avoid using a public kiosk charger:

  • Turn off most of your devices: Make a habit of charging your phone and office with your phone when you are not actively using it.
  • Take personal charger: Chargers have become very small and portable from USB cables to power bank. Get one and throw it in your bag, when you use a power bank, you can charge it anytime on your phone while in the office or whenever you go.
  • Run backup battery: If you are not eager to bring an extra charger or a power bank, you can choose to have a full spare battery if your device has a removable battery
  • Lock your phone: When your phone is locked as accessible as an access to the PIN or equivalent passcode, your phone cannot be connected to the device connected to it.
  • Turn down the phone: This technique works only on a model by model, as some phones run down, allowing full USB circuits to still be in the power store and the flash store in the device.
  • Use only USB cable power: These cables are missing two stars that are needed for data transmission and there are only two stars for the remaining power transmission. They will charge your device, but the data transfer has become unbearable.

The smallest details like charging from your phone kiosk charger can also affect the security of your device. There are many options for using third-party systems, but ultimately the best protection against compromised mobile devices is awareness. Want to know more about today’s safety and threats? Contact me today and see how I can help.

Interview With ZeeNews on Smartphone Juice Jacking

Leave a comment

Your email address will not be published. Required fields are marked *