juicejacking

Hackers are looking to install steal from your device through the charging cable. See how the USB Defender keeps you safe from juice jacking.

A phone or laptop drying off charge is likely to send jitters around your mind. You want to talk to your friends, catch the latest news or post a picture while at the airport. But, don’t let the urge overwhelm you. You may want to rethink your decision to plug into the USB port!

Beware of Juicejacking

On average, 148 Aussies report cases of phishing and hacking of their devices every day. That’s a case reported every ten minutes. While cybercrime sounds like an overly sophisticated way of fleecing people of their money, it starts as a simple activity. For instance, plugging your phone or computer into a power or internet socket could easily give way to hackers. Juice jacking occurs when malicious people use power and internet cables to access your device.

Think about it- in Kenyan universities and workplaces, many people have used the public network to create a homegroup and transfer movies or other important files there. In some instances, some malicious Wi-Fi and LAN users have gone ahead to install undefined programs on other people’s computers. That’s exactly how juicejacking works, but on the charging port this time.

Brian Krebs coined the term “juice jacking” in 2011 after a study by the Wall of Sheep showed phone users at a free charging station at DEF CON received a similar message that warned them of a potential breach.

Juice jacking occurs when hackers load malware through USB ports. When you plug into the USB port in your hotel or other public amenities, the hacker could infect your device with malware. Typically, your phone or computer brings options of whether you want to charge the device or to transfer files.

In addition to charging, the USB cable connects the two devices and offers a possible channel for data transfer. Unless you are running on old Operating Systems, data transfer should be disabled by default.

Juice jacking using a malicious USB charging cable

Once installed, the malicious program could take over your device and export or reads your data. This exposes your passwords, messages, and critical information. In the case malware installation, the cybercriminals download malicious code onto your device intending to take over its functions.

The USB connection provides the channel through which the hackers install the code or program. The program could be a Trojan, adware, spyware, ransomware, or cryptominer. It isn’t very easy to tell if your phone has malware, mainly because these programs are hidden out of sight. Phones with the malware installed run out of resources and battery charges faster than usual.

Preventing USB juicejacking attacks is the best way to stay safe. Staying away from all public phone-charging stations could be the best bet. But, that would mean you’d stay disconnected from your work, friends, and family. So, you can correctly use the traditional charging AC sockets instead of the USB varieties.

If you still want to use the USB connection, make sure to have a USB Condom. With a USB defender, you can use the USB port without utilizing the data transfer pins — the cable functions as a charging cable and not a data exchange pipe. You can attach them to your cable, and they will keep you protected.

Protect Yourself With Our USB Defender!

The juicejack USB defender prevents any data accidental or malicious data exchange between your phone and the charging port. With the USB condom, nothing but power is getting into your device. The lightweight data blocker is far smaller than a flash-drive and guarantees you 100% protection. Stay safe at airports, coworking spaces, hotels, or even hospitals by purchasing yours today. Enjoy a 25% discount when you buy your USB Defender today!

Facebook Comments

Leave a Reply

Your email address will not be published. Required fields are marked *