Taking a juice break? Your smartphone may be hacked if you’re not careful

‘Juice-jacking’ exploits are able to extract users data because the same port used to charge a device also transfers data

The most common devices to face ‘Juice-jacking’ can be USB ports and phone charging cables
The most common devices to face ‘Juice-jacking’ can be USB ports and phone charging cables

What if while having a ‘juice break’ your data goes through ‘Juice-jacking’. As users charge their devices at public places , experts believe cyber criminals can drain their data from the USB charging stations. From what it is understood, Juice jacking can be defined as a hardware-based third party attack. The attacker uses a USB connection to send malware onto the charging station or to corrupt a connection cable leaving it plugged-in. Eventually an user  uses the ‘forgotten’ cable and falls into the exploiters trap. This can result in data leakage of sensitive data, containing personal information, which might pose a threat.

It is believed that ‘Juice-jacking’ exploits are able to extract users data because the same port used to charge a device also transfers data. Even after having five pins, the USB connector uses only one to charge and only two of the five pins to transfer data. This pattern allows an end user to move files between a mobile device and a computer while the mobile device is being charged.

Reportedly, the most common devices to face ‘Juice-jacking’ can be USB ports and phone charging cables, which are usually found in public places. Experts believe that ‘Juice-jacking’ emerged at the DEF CON hacking conference in August 2011. As  safety precautions users are advised to switch off their devices while charging. Also, frequent updates of device need to be executed and users’ devices should not pair with any unknown devices. Experts believe carrying own charging devices is always a safer option, rather than depending on the public ones. Additionally adding passwords and PIN can also protect users from ‘juice-jacking’.

Furthermore, in case the user is already being affected by the threat, they can report immediately to the cyber fraud team. Users need to file the complaint  by contacting the helpline number at  1930 or filing a cyber fraud report at https://www.cybercrime.gov.in, cyber frauds official website.

Get live Share Market updates, Stock Market Quotes, and the latest India News and business news on Financial Express. Download the Financial Express App for the latest finance news.

This article was first uploaded on April one, twenty twenty-four, at fifty-four minutes past two in the afternoon.
Market Data
Market Data