Category

Attack

Smart Phone Juice Jacking

Whichever type of modern smartphone you are using – whether it’s an Android device, an iPhone, or a Blackberry – it’s a common feature in all phones and it’s the power to pass the power supply and data flow from the same cable. Even though you now use standard USB minibus connections or cable which comes with Apple phones, the same situation is: the cable used to recharge your phone’s battery is the same cable you are using to transfer and sync your data.

This setup provides an approach vector for the malicious user to access your phone during the charging process; the data/power on the same cable; To get the USB data/power cable injected in order to illegally access the phone data and/or identify the malicious code as a juke jacking in the device

How can I avoid this?
Instead of charging your phone using a third-party system, only the most effective caution center. Here are some tips to help you avoid using a public kiosk charger:

  • Turn off most of your devices: Make a habit of charging your phone and office with your phone when you are not actively using it.
  • Take personal charger: Chargers have become very small and portable from USB cables to power bank. Get one and throw it in your bag, when you use a power bank, you can charge it anytime on your phone while in the office or whenever you go.
  • Run backup battery: If you are not eager to bring an extra charger or a power bank, you can choose to have a full spare battery if your device has a removable battery
  • Lock your phone: When your phone is locked as accessible as an access to the PIN or equivalent passcode, your phone cannot be connected to the device connected to it.
  • Turn down the phone: This technique works only on a model by model, as some phones run down, allowing full USB circuits to still be in the power store and the flash store in the device.
  • Use only USB cable power: These cables are missing two stars that are needed for data transmission and there are only two stars for the remaining power transmission. They will charge your device, but the data transfer has become unbearable.

The smallest details like charging from your phone kiosk charger can also affect the security of your device. There are many options for using third-party systems, but ultimately the best protection against compromised mobile devices is awareness. Want to know more about today’s safety and threats? Contact me today and see how I can help.

Interview With ZeeNews on Smartphone Juice Jacking

To prevent viruses

So far, if you’re using a pirated window on your computer, now include the original Windows 10.

Go to the Computer Control Panel and go to System and Security and make sure that the settings of Windows Firewall are correct.

Upload any good company’s antivirus software to the computer. Also, follow the settings and follow the full Computer Scan.

When you turn on the computer, the antivirus updates most of the software. So do not cancel the update even if there is any disturbance.

Do not keep the computer or laptop’s default password. For example … abc, 123, characteristic words, your birth date, words in the English dictionary, etc. are not included as a password.

Never keep a password in your computer or browser. If you have a message like ‘do you want to save this password’, answer ‘no’.

Address bar – where the URL is included; If there is a sign of the locked lizard in the beginning, then it is not possible to know that the website is safe.

Never open links from e-mail or any other website. Know who has sent a link exactly before opening.

‘Cyber Stocking’ Be Watchful!

In this type of ‘Cyber Stocking’ the victim is harassed through the Internet.

Earlier, violence was being done by women on the basis of dowry, family violence, rigging, sexual harassment at work, and persecution by unilateral love, and now it has included internet harassment.

The internet continues to be the type of sending messages before sending or sending obscene messages to women; But now email has become a big medium for this. Blackmailing, threatening or attempting to engage in pornographic intercourse especially for girls, such type is being done more frequently than ever from emails. In most cases, the person who is close to or acquainted with the woman is familiar with it. However, this group is making ‘cyber stockings’ by creating fake accounts.

In this type of ‘cyber stocking’ the victim is harassed through the Internet. In such cases, making phone calls, doing bad things against a person or writing a sentence on his / her body. Most of the time, the culprit in this manner is a disloyal, one-sided love, but at times the humiliated person has done such a thing even with the feeling of vengeance. In this case, the victim’s personal information, family information, phone number and the victim’s diary can be collected by collecting information about it and using that information to hurt the victim. This type of personal information has also been posted on the Internet’s sex service or dating services website