Charging in public places? Watch out for “juice jacking” • Blisstech Solutions

Airports, hotels, cafés, even shopping centres, offer public charging points where you can boost your phone or laptop battery on the go.

They’ve been in the news after the FBI recently tweeted advice to stop using them. Crooks have figured out how to hijack USB ports to install malware and monitoring software onto devices as they charge.

The security risk of “juice jacking” was long thought to be more theoretical than real, but the tech needed to carry out an attack has got smaller and cheaper and easier to use. This means less sophisticated criminals are now turning their hand to it.

So how does it work?

The most common charging cables – USB-C and lightning – are dual-purpose. They have pins for charging and pins for data.

When you charge your device, you only use the charging pins. But a compromised charging port – or a cable that someone has left behind – could use both charging pins and data pins without you knowing.

When they use the data pins, criminals can install malware onto your device that gives them access to your credentials and other data. It’s a little like plugging your phone into someone else’s laptop.

To avoid the risk, the best solution is to always carry your own charger and cable, and plug it into a power outlet. If you have no choice but to use a public USB port, invest in something called a USB data blocker. This prevents data being transferred, but the device will still charge.

We help businesses stay secure and productive at the same time.

If we can help you, get in touch.

More Content

Tech Tip: How to use Copilot AI to Create Presentions

Welcome to a new Tuesday tech tip video. In it, I'll show you how to leverage the power of Microsoft 365 Copilot AI and PowerPoint to streamline your presentation creation process. Whether you're a seasoned professional or new to creating presentations, this video...

IT Security Still Top Concern For SMBs

A new report from Kaseya reveals that IT Security is still the top concern for small and medium-sized businesses.  The “2019 State of IT Operations for Small and Midsize Businesses” survey took input from more than 400 global respondents and reveals that 32% of...

Bot malware is a growing security threat

Bot malware is a worrying new security risk. Malware bots steal whole user profiles – that’s a complete snapshot of your ID and settings.

KEMP Virtual Santa Fun Run Logo

Blisstech Solutions sponsors KEMP’s Virtual Santa Fun Run

In 2020 everything has been different, and the traditional KEMP Hospice Santa Fun Run is no exception.  In a year where so many charity and participation events have been cancelled, it is great to see that this iconic local event is going ahead, albeit in a very...

IT Managed Services for Law Firms

Over the years, technology has shaped and changed legal firms in the UK in many ways.   Technology has helped legal firms to go digital and provide a streamlined client experience by allowing them to access case files online from anywhere. Technology has also helped...
Snip and Sketch video thumbnail

Tech Tip: How to use the Snip and Sketch tool

This is a Tech Tip on how to use the really handy Snip and Sketch Tool built into Windows. Who said that "a picture paints a thousand words"? I'll leave you to Google that one as I couldn't work it out! Anyway, there are times when an image is the best way to...
How to cheat (the Blue Screen of) Death

The Blue Screen of Death and how to avoid it

The dreaded Blue Screen of Death makes you panic about what happened, how much work you’ve lost, and how long it’ll take to fix. But a lot of the time it’s avoidable… We’ll tell you how.

Tech Tip: How to create private Teams and channels

Welcome to a new Tuesday tech tip video. This one shows you how to create private Teams and channels in Microsoft Teams. Microsoft Teams is a powerful tool for collaboration, but how do you limit access to what people can see? The answer: Private Teams and private...

Getting to Grips with Email Security

Owners of small and medium-sized businesses often make the mistake of thinking that they aren’t on the criminals’ radar. But more than 40% of cyber attacks are aimed at small businesses – and email is usually the criminals’ way in. Our new guide, ‘Getting to Grips...
Blisstech - Top M365 Tools - Blog image

Unlock the Hidden Productivity Gems within Microsoft 365

Microsoft 365 is a cornerstone for many businesses, but its vast potential often remains untapped. While applications like Word, Excel, PowerPoint, and Teams are widely used, there's a treasure trove of productivity-enhancing tools waiting to be discovered. Embark on...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05