Charging in public places? Watch out for “juice jacking” • Blisstech Solutions

Airports, hotels, cafés, even shopping centres, offer public charging points where you can boost your phone or laptop battery on the go.

They’ve been in the news after the FBI recently tweeted advice to stop using them. Crooks have figured out how to hijack USB ports to install malware and monitoring software onto devices as they charge.

The security risk of “juice jacking” was long thought to be more theoretical than real, but the tech needed to carry out an attack has got smaller and cheaper and easier to use. This means less sophisticated criminals are now turning their hand to it.

So how does it work?

The most common charging cables – USB-C and lightning – are dual-purpose. They have pins for charging and pins for data.

When you charge your device, you only use the charging pins. But a compromised charging port – or a cable that someone has left behind – could use both charging pins and data pins without you knowing.

When they use the data pins, criminals can install malware onto your device that gives them access to your credentials and other data. It’s a little like plugging your phone into someone else’s laptop.

To avoid the risk, the best solution is to always carry your own charger and cable, and plug it into a power outlet. If you have no choice but to use a public USB port, invest in something called a USB data blocker. This prevents data being transferred, but the device will still charge.

We help businesses stay secure and productive at the same time.

If we can help you, get in touch.

More Content

90% of cyber attacks start with a simple email. Why?

All it takes is one email... Did you know it can just take one email to bring your entire business to its knees? Why? Because a surprising 90% of cyber attacks begin with an email. And if you and your whole team are reliant on email every day, your chances of falling...

Tech Tip: An overview of Microsoft Teams

Welcome to a new Tuesday Two Minute Tech Tip that covers the basics of Microsoft Teams. Microsoft Teams has become one of the 'go to' tools for collaboration since the start of the pandemic, but most people are only scratching the surface of what you can do with it....
Blisstech - Top M365 Tools - Blog image

Unlock the Hidden Productivity Gems within Microsoft 365

Microsoft 365 is a cornerstone for many businesses, but its vast potential often remains untapped. While applications like Word, Excel, PowerPoint, and Teams are widely used, there's a treasure trove of productivity-enhancing tools waiting to be discovered. Embark on...

Is your business data at risk? Don’t take chances with old tech

Old computers and external drives can put your sensitive business data at risk.
We look at how to dispose of old computers and external drives in the safest way possible.

Pirated software thumbnail

Don’t walk the plank with pirated software

A huge number of small and medium-sized businesses would consider using pirated software to try and save money. Don’t do it.

Professional woman at a laptop

6 ways to make your small business look professional

When you start out in business, one of the hardest things to do is find new clients.  Most customers will not buy from you unless they trust you, and trust usually comes from reputation.  But how do you gain people's trust if you are new and don't have much of a...

Tech Tip: How to create a table of content in Word

Happy Tuesday everyone! Today's Two Minute Tech Tip was an idea given to me by my apprentice, George Borns. When asked what would be a good idea for a Tech Tip and without hesitation, George said "What about headings and tables of content in Word?" It is a great tip...
Cyber extortion: What is it and what’s the risk to your business?

Cyber extortion: What is it and what’s the risk to your business?

Have you heard of cyber extortion? It’s a very real threat to your business. Here we explain what it is and how to stay safe.

Are your younger employees experiencing ‘tech shame’?

Gen Z and even some Millennial employees are less tech savvy than many employers might expect. It’s an assumption that’s leading to a sense of ‘tech shame’.

How to Secure Your Business from Cyber Threats in 2024: A Free Guide

Protect your business from these cybersecurity threats in 2024 We’re weeks away from the new year. And this is a great time to start thinking about what needs to get better in 2024. We believe you should allocate more of your business’s precious resources to the...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05