As already mentioned in a previous post, we can no longer spend a day without our smartphone.

Who does not know someone who carries a power bank, a battery power case or a USB cables?.

As businesses become increasingly aware of this, they are deploying public charging stations for their customers.

What risks do we run when we use these public charging stations (tablets, smartphones, etc.)?

To answer the previous question we are going to analyze the origin and first purpose of the USB cables.

At first, these cables were created to transfer information between different devices. The problem is that, when it comes to public charging stations, we do not know who is behind or his motivations. And yet, by using these stations, we give them full access to our photos, files, banking data, email, etc.

What does all this have to do with Juice Jacking?

Juice Jacking is the name given to the process by which, through a hacked port, cybercriminals record everything we write or watch, and can even download programs on our mobile devices to, for example, follow us.

Having said that, we would not want to generalize or create doubts concerning the good faith of businesses. Many of them just want to make our lives easier.

So... what should I do, then?

The goal of this post is to raise awareness and encourage you to think before using public charging stations. Is it worth the risk?. Do we really need to use them?. Can the photo be uploaded to Instagram later?

Finally, we would like to share with you some tips to help you minimize risks as much as possible:

  • Always carry your own power bank or USB cable
  • Plug your mobile devices into electrical outlets
  • Create a different password for each app
  • Install only those apps available on official Marketplaces

And if there is no other option than using public USBs, first turn off your device. And if it essential that you have it on, do not unlock it.

Follow us on Twitter and LinkedIn to stay up on the latest updates and remember that you can also subscribe to our blog!.