Skip to main content

Charging the phone in cargo centers at airports and public places presents the phones at risk of "stealing the juice"


Charging the phone in cargo centers at airports and public places presents the phones at risk of "stealing the juice"
Charging the phone in cargo centers at airports and public places presents the phones at risk of "stealing the juice"



It was widely believed that smartphones could be hacked when they were shipped using a USB data cable, but a new study revealed that it was also possible to penetrate smart phones through conventional power cables once connected to an energy source.
In a study published in the scientific journal Informatics and Security, researchers warned that public transport units could be used to penetrate smart phones and snoop on Web sites viewed by a user on his mobile phone.
The user often charges a smartphone at a shipping hub in airports and public places. If the center is hacked, the user risks exposing his phone to the risk of data theft through the USB data cable, the so-called " Steal the juice, "according to researchers.
The study by the New York Institute of Technology is the first to show that even without a data cable, hackers can analyze the power consumption of the device to see user-specific, accurate, and speed-based information on a number of factors.
"Web pages have special fingerprints that reflect the way energy is loaded and consumed, and these effects are like fingerprints that help hackers know the Web sites on the smartphone," says researcher Paolo Gaste.
In a previous study, researchers cautioned that the cable you used to charge your phone was also used to send data from your phone to other devices. For example, when your iPhone connects your Mac to a charger, you can still download images from your phone to your computer.
Therefore, if a USB port is hacked, there is no limit to what a victim can get from your phone, including e-mail, text messages, images, and contacts.
To avoid the risk of hacking your phone and violating your privacy in public, use a mobile external battery to charge your phone whenever necessary.

Comments

Popular posts from this blog

Nokia reportedly plans a return to smartphones in 2016

Nokia is planning to make a comeback and return to making phones in 2016. That's according to personnel familiar with company plans, who reveal that releasing Android tablets under the brand simply isn't enough. Nokia reportedly plans a return to smartphones in 2016  Nokia reportedly plans a return to smartphones in 2016  With the introduction of the Nokia 2016 has become a company with freedom, where officially ended item that was part of Microsoft's takeover deal, which prevents the company from the competition in the mobile phone market and the issuance of phones under the brand Nokia the day before 12.31.2015. Nokia reportedly plans a return to smartphones in 2016  On the ground for the return of Nokia phones market was waiting and leaks that began to appear in the days abound and the days to come naturally to one of the most prestigious companies in the mobile industry. Nokia reportedly plans a return to smartphones in 2016  Today featur...

Microsoft decided 4.7 million device at least from personal computers infected with malware developers prepared and published in Kuwait and Algeria.

Microsoft decided 4.7 million device at least from personal computers infected with malware developers prepared and published in Kuwait and Algeria. Microsoft decided 4.7 million device at least from personal computers infected with malware developers prepared and published in Kuwait and Algeria. Microsoft decided 4.7 million device at least from personal computers infected with malware developers prepared and published in Kuwait and Algeria. These victims do not realize they are infected currently  Char that "the editing process" is the most successful of the last century between the operations carried out by the Digital Crimes Unit at Microsoft so far depending on the number of infected machines that could be identified.  Microsoft has identified personal devices infected by intercepting communication with hardware servers in the company, "Vitaloerks" Web Solutions, based in Reno, Nevada.  Vitaloerks criticized the way in which Microsoft has d...

The confessions economic killer "John Perkins" US intelligence agent CIA

Part of the confessions economic killer "John Perkins" US intelligence agent CIA  the confessions economic killer "John Perkins" US intelligence agent CIA Speaking about the history of economic killer project within the corridors of the CIA .. and the steps involved to control the states .. He says: Stages of that plan: start sending men from US intelligence agents as businessmen to the States to be economically occupation Vtkhadda governments then supported on huge projects that State resources, but these projects aims mainly to download a huge state debt and the country's economy collapse and default on those debt .. And then suppose we Americans are our conditions .. First that allow us to build military bases on their territory or send their army to serve us in our battles such as Iraq, Afghanistan or vote for us in the United Nations or sell for our companies American resources such as electricity companies, water and possible also sell us their sch...