>
As the FBI warns, hackers are using public charging stations to steal your iPhone data… here’s how to protect yourself from bugged ports
If you plug your iPhone or iPad into a charger and see the “Trust This Computer” prompt, a hacker has compromised the power source. A simple click on ‘Don’t Trust’ prevents the data thieves from accessing the device
Cybercriminals have the skills to use public charging stations to infiltrate connected devices, but Apple has a secret weapon to keep you safe from juice jacking.
If you plug your iPhone or iPad into a charger and see the “Trust This Computer” prompt, a hacker has compromised the power source.
A simple click on ‘Don’t Trust’ prevents the data thieves from accessing the device.
The Federal Bureau of Investigation (FBI) issued a warning in April urging people not to connect to free power in malls, hotels and airports for fear of data theft.
Juice jacking, as it is called, is when hackers install malicious code or cables in public USB chargers to read and steal and even track data from mobile devices.
“Malware installed through a damaged USB port can lock a device or export personal data and passwords directly to the perpetrator,” the Federal Communications Commission (FCC) said in its statement. website.
“Criminals can then use that information to gain access to online accounts or sell them to other malicious parties.”
While the cyber-theft tactic has been around for quite some time, the number of attacks has increased, prompting the FBI to issue a warning in April.
Everyday tasks – opening an email attachment, following a link in a text message, making an online purchase – can expose you to online criminals who want to damage your systems or steal from you. website of the FBI.
The Federal Bureau of Investigation (FBI) issued a warning in April urging people not to connect to free power in malls, hotels and airports for fear of data theft
Juice jacking, as it is called, is when hackers install malicious code or cables in public USB chargers to read and steal and even track data from mobile devices
“To prevent crimes over the internet and cyber intrusions, we all need to be on our guard.”
Another common tactic is to hack the end of a USB cable yourself and then leave it plugged into a charging station in hopes that people will use the hacker’s cord instead of digging through their bags to get their own cable out to get.
According to Los Angeles District Attorney Jackie Lacey, hackers used malware at public USB charging stations to export data from someone’s phone, steal passwords or block the user’s access to their device.
Unlike conventional power cords, USB cables are designed to carry data and power between two devices.
This double convenience comes at the cost of leaving open a data path to a person’s portable devices not offered by conventional power cords.
The FCC also shared tips to protect your devices from jack juicing.
The agency suggests using a traditional wall outlet to plug in a charger, bringing an external battery, or “consider bringing a charging-only cable, which prevents data from being sent or received while charging, from a trusted supplier’.
Another option is to buy special ‘no-data transfer’ USB cables.
These specially crafted cables have connector pins that transmit data away from the USB port, meaning there’s no path for potential malware or viruses.
There are also some creatively named accessories to block USB transfer data, such as the Juice-Jack Defender.
These essentially act as an adapter between a public USB port and a person’s USB cable, preventing data from reaching the USB cable.