Everyday, we get to hear different incidents of online hacking or invasion of privacy. The truth is with the advancement of technology, hackers and their hacking techniques are getting more and more sophisticated.
We are here today to warn you about a
technique commonly referred to as ‘juice jacking’, among hackers and security experts. Trust
us, you need to be aware of this situation, now more than ever, thanks to the
Have You Been
Charging your Phones on Charging Stations?
A few days ago, State Bank of India (SBI), the country’s largest lender warned it customers about not using public stations for charging their gadgets, like mobile phones, tabs, laptops or any of their electronic devices holding any form of information that could be misused if hacked.
This being said, SBI also tweeted, warning everyone to think twice before plugging in their electronic devices at charging stations. Malware could find a way in and infect your phones, giving hackers a chance to steal your passwords and export your data.
This is pretty basic
right? I mean with the heavy disruption of technology and its diverging forms
used for different purposes, its pretty easy to believe that charging from an
unreliable source could lead to access of data to an unknown source, given the
decree of such incidents.
Public mobile charging stations are common in crowded places. Telecom operators in India also provide charging stations for mobile handsets. The ones with low battery on their phones find these stations useful and happily plug in their mobile for charging. However, it may not be as safe and secure as it appears.
What is Juice
Let’s learn a bit more upon the sensitivity of such
situations. There is a possible
hacking through hardware, most of which makes use of Universal Serial Bus
(USB). Since the holiday season is upon us and many more will be travelling, we
took this platform to inform you about this form of hacking, not many know.
Juice jacking involves a charging port that can be used as a data connection device as well, typically over USB. With the help of this, hackers either install malware or copy sensitive data from a smartphone, tablet or other computer devices, without the owner’s knowledge. Juice jacking involves a charging port that can be used as a data connection device as well, typically over USB.
Security experts have been warning users about
it since many years. The US National Security Agency, in late-2012 warned
people to use only their personal power charging cables and not indulge into
using public kiosk or charge devices through other people’s computers
especially while travelling.
How To Prevent Juice Jacking?
In an attempt to show how such a technique can so easily be put
into use, some security
researchers and students from Georgia Institute of Technology demonstrated how
juice jacking works, in 2013.
Using simple and inexpensive hardware
components, they constructed a small-sized wall-charger that could infect an
iPhone through malicious software.
There are however, certain precautionary
measures that one can take, in order to protect themselves from at least such
type of hacking procedure.
- Users should not connect their gadgets to any unknown USB drives.
- Never use a public charging station or anyone else’s laptop or PC for charging your electronic devices.
- Make sure to use only your charger and cable provided by the manufacturer of the device.
- Buy a good-quality power bank with sufficient capacity, in case you run out of power.