If you have spent any time traveling through an airport, you have seen a public charging kiosk. you might think, how convenient. Especially if your alternative is moving onto the floor closer to an outlet in the terminal.
But before you plug your phone into one of these kiosks, there are some security issues to discuss.
One such security threat is, “juice-jacking”. TechAdvisory.org defines juice-jacking as the process by which, “user access is gained on your phone by leveraging the USB data/power cable to illegitimately access your phone’s data and/or inject malicious code onto the device.”
Juice-jacking can affect any phone, both Android or iPhone. They both have the same weak spot: the charging cable. Data runs through this cable same as the power supply. Once the hacker has been able to access your data, it doesn’t matter that you have unplugged from the kiosk.
Juice-jacking is a security concern worth noting. But juice-jacking is not as large a problem as getting your phone/tablet stolen or downloading corrupt software by mistake. Still, we all should take precautions. Consider some of the safety measures:
Keep your device charged. Have your phone charged and ready to go before making a trip or going to an event. This prevents the need to charge in public.
Carry a personal charger. These nifty devices are inexpensive and take up very little space in your bag. You can charge on the go without tethering yourself down to a public kiosk.
Keep a spare battery for all of your devices.
Lock your phone. If you lock your phone (type in a passcode to open), it will not pair with the kiosk.
Tip: Make sure you lock your phone before plugging it in. Pairing only takes seconds!
If you feel you have a corrupted phone after charging at a public kiosk, we would be glad to assist in solving the issue.
Other Articles You Might Be Interested In:
Disaster recovery plans are vital, not just important. Data becomes lost, deleted, purged, corrupted, all the time. Without that measure in place, data is truly lost. There does seem to be confusion on what constitutes a Disaster Recovery plan, however. While many...read more
Data backup is a critical part of an organization’s overall disaster recovery plan. The concept of data backup is simple: you make copies of your data and store them in a different location in case data is lost or destroyed.read more
Founded in 1999, ITonDemand helps businesses and associations across the US achieve growth by guiding and supporting IT infrastructure and providing cybersecurity management. ITonDemand’s Core Solution and Security+ have been recognized among both Managed Services and Cybersecurity Providers as a member of the MSP Pioneer 250 and the Top 200 MSSPs.