Rivercity Technology Services LTD Logo
About Us
Services
Icon showing a support technician
IT Support Services
Cybersecurity Risk Management at one predictable flat rate.
Icon of light bulbs on a laptop screen
IT Consulting
Business optimization through the smart use of technology.
Icon showing a hand holding a phone
Business Phone Services
VoIP Telephone solutions from RCT. 
Icon showing a database and a cloud
Backups & Recovery
Cloud & On Premise - ready to recover!
Icon showing website wireframes
Website Development & Hosting
Web design and full hosting & maintenance packages!
Icon showing an envelope being opened
Modern Email Management
Microsoft 365 email provisioning, security & management.
Icon of a magnifying glass inspecting binary code on a computer screen
Cybersecurity Risk Assessment
Internal auditing to help identify potential cyber threats.
“You’re giving me the ‘it’s not you, it’s me’ routine? I invented ‘it’s not you, it’s me.’ Nobody tells me it’s them not me; if it’s anybody, it’s me.”
- George Costanza
Learning CenterNewsletterContact Us
Book A Consultation

Juice Jacking: The Shocking Threat Lurking at Public Charging Points

Are you always on the lookout for charging points in public places? Who isn't, right? But hold on, have you heard of "juice jacking?" It's not some new fad drink, it's a serious security threat!

You see, we all love to charge our phones and laptops on the go, and public charging points at airports, hotels, cafes, and malls come in really handy. But, beware! Criminals have found a new way to hijack these USB ports and steal your private information. Scary, right?

The FBI recently warned people to stop using public charging points as crooks can now install malware and monitoring software onto their device through these charging ports. While this security risk was once considered theoretical, it's now a real threat, thanks to the smaller and cheaper technology that's easily available to even the less sophisticated criminals.

So, how does "juice jacking" work? Well, the most common charging cables - USB-C and lightning - are dual-purpose, meaning they have pins for charging and pins for data. When you charge your device, you only use the charging pins. But, if someone has left behind a compromised cable or port, it could use both the charging and data pins without your knowledge. Sneaky, right?

The criminals can then use the data pins to install malware onto your device, giving them access to your credentials and other sensitive data. It's like plugging your phone into someone else's laptop, only much worse!

Now, don't panic just yet! The solution is pretty simple - always carry your own charger and cable and plug it into a power outlet. But if you're left with no other option but to use a public USB port, invest in something called a USB data blocker. This handy device prevents data from being transferred while still allowing your device to charge.

Stay safe, folks! And if you're a business owner, we can help you stay secure and productive at the same time. Get in touch with us today!

Until next time, keep fit and have fun!

(TYYV) The Yada Yada Version:

Juice jacking is the new security threat that allows criminals to install malware and steal sensitive data from devices as they charge at public charging points and yada yada yada carry your own charger or invest in USB data blockers to avoid the risk.

Mitch Redekopp
Article Written by Mitch Redekopp

Get in Touch

Need IT Services or Cybersecurity for your business? Have tech questons? Contact us today, we'd love to help you!
Blog Sidebar Contact Form
Related Articles
Featured image
Is Your Business’s IT Future-Ready?
How confident are you in the technology powering your business? A recent study revealed that while 90% of business leaders believe their IT systems are “best ...
Rivercity Technology Services LTD logo
We are your IT department. How would you like to manage your risk?
201-116 Research Dr,
Saskatoon, SK
S7N 3R3

306-933-3355

Copyright © 2024 - All Rights Reserved

crossmenu