Warning To consumers from FBI, Not to use public phone charging station

Warning To consumers from FBI, Not to use public phone charging station


 As per the report of CNN, the
FBI is warning consumers all over the USA against using public phone charging stations to avoid exposing their smartphones or devices to malicious software.


Public USB stations like we found at airports and malls are being used by bad actors to spread up monitoring software and malware, according to a recent tweet last week from the Denver branch of FBI. The agency didn't provide any kind of specific examples. 


As per the agency "Carry your own USB and

Charger and use an electrical outlet instead," ( in the tweet ).


While the public stations of charging are attractive to many when are running low on battery, experts in security have for years raised concerns about this type of risk. in 2011 the "juice jacking" name was given by the researchers to describe the problem. 

Warning To consumers from FBI, Not to use public phone charging station


"Just by putting and plugging your phone into the charger or power strip (Compromised), your device is now affected and compromises all your data," Drew paik (explained to CNN in 2017) formerly of security firm Authentic8.


The cord you use for charging your mobile or smartphone is also used to send data from your phone to any kind of other device. For instance, once you connect your iPhone into your Mac with the charging cord, you can easily download photos from your phone to your laptop pc or computer devices.


No one can give the details of what information a hacker could take once the port is compromised, Paik previously described to CNN in the report. 


It is a new type of technology or we can say program that generally hackers use to harm anyone's phone or device. Hackers generally infect the USB port or the cable for charging before the user connects. Once your phone is connected, the attacker can upload any type of malware to your device, it could be a smartphone or laptop, initiate data transfers, or monitor your keystrokes. It sounds dangerous.

Thanks for reading our tech news blog!

Post a Comment

0 Comments