NewsPublic USB chargers pose data theft risk: How to stay safe

Public USB chargers pose data theft risk: How to stay safe

American officials are warning about the risks associated with using public USB chargers. The so-called 'juice jacking' technique allows hackers to seize data from devices, creating a global threat. Here's how to protect yourself from this issue.

Do you charge your phone like this? It's better to stop. They can steal your data.
Do you charge your phone like this? It's better to stop. They can steal your data.
Images source: © Adobe Stock | PAWEL_KACPEREK

During travel or daily outings, many of us use public charging stations to recharge our smartphones. However, few realise the risks of connecting their devices to publicly available USB ports. Security experts refer to this technique as "juice jacking." This involves transferring malicious software to a device via a USB cable, which allows data transfer in addition to charging.

The history of such attacks includes cases like Mactans, identified in 2013 by the Georgia Institute of Technology, or USB Ninja, which looks like a standard cable but can install malicious software. Another example is KeySweeper – seemingly an ordinary charger that logs wireless keyboard activity and transmits data via GSM to the attacker.

How to protect yourself

In light of the growing threat, officials from Los Angeles, as well as technology portals, recommend avoiding connecting devices to public chargers. The safest solution is to use your own charger connected directly to a power outlet or to use power banks.

An innovative solution is the so-called USB Condom (SyncStop) – a special cover for the cable that blocks data transfer, allowing only charging.

Public chargers can be compared to keeping a wallet in the back pocket – nothing might happen, but there is a risk that someone could take advantage of it. In times when smartphones store our personal data, photos, and passwords, it is wise to be particularly cautious not to fall victim to scammers.

Regularly securing devices, avoiding suspicious cables, and choosing safe charging methods can protect our information from potential leakage or theft.

Related content
© Daily Wrap
·

Downloading, reproduction, storage, or any other use of content available on this website—regardless of its nature and form of expression (in particular, but not limited to verbal, verbal-musical, musical, audiovisual, audio, textual, graphic, and the data and information contained therein, databases and the data contained therein) and its form (e.g., literary, journalistic, scientific, cartographic, computer programs, visual arts, photographic)—requires prior and explicit consent from Wirtualna Polska Media Spółka Akcyjna, headquartered in Warsaw, the owner of this website, regardless of the method of exploration and the technique used (manual or automated, including the use of machine learning or artificial intelligence programs). The above restriction does not apply solely to facilitate their search by internet search engines and uses within contractual relations or permitted use as specified by applicable law.Detailed information regarding this notice can be found  here.