What’s Juice Jacking?
Public places like airport, railways, shops etc have public charging stations and we are often desperate to use them when our devices are drained out. But, the same charging port can take complete control of your smart-phone and inject malicious codes.
Thus, public charging spots are both boon and bane for users. While they are a great help when the battery of our mobile phone is drained out, but they can also steal confidential data by installing malwares in our devices.
The technology required to compromise a public USB charging port is easily available and hence the threat of Juice jacking is very real.
Juice jacking is a cyber attack technique involving use of free public smart-phone charging kiosk for installing a malware using a USB charging port. Subsequently, the malware copies all of the phone’s data covertly.
Precautions to Protect Devices from Juice Jacking:
- Do NOT charge your phone using a third party system:Like publically available charging points.
- Carry a personal charger:Today’s chargers are very small, portable devices and thus can carried along easily.
- Charge devices at leisure time:You should make a habit to charge your phone at home or office when you are not actively using it.
- Power the phone down:This prevents juice jacking but only on a model-by-model basis. This is because in some phones, even after switching off the phone, it can still power on the entire USB circuit and allow access to the flash storage in the device.
- Lock the phone:This disallows the phone from paring with the device it is connected to, unless the right-pin or pass-code is provided.
- Use power only USB cables:These cables do not have the two wires necessary for data transmission and have only the two wires for power transmission. Thus, they enable charge the device, but not data transfer.