Charging Phones in a Public Place Can be the Reason Hacked Your Data


Smartphones have now brought the world in the palm of your hand. But hackers can steal all your information through smartphones. And that may be without your knowledge.


If you regularly charge your mobile phone or tablet (tab) at a charging point in a public place, such as an airport, train station, bus stand or cafe, it's time to be alert. Because hackers are currently targeting these charging points.


According to a report by the news agency UNB, charging batteries in public places can hack smartphones, iPhones, and tablets. This is what is happening in many countries now. One day you may be charging the phone, and on the other hand, all the information on your mobile phone is going to hackers. Even if the phone is removed from the charge in a public place, the danger is not diminishing. Because hackers can turn on your phone's WiFi through the charging port and use it as they wish.


  • Juice jacking:


In fact, hackers are hacking your smartphone or tablet through a technology called 'juice jacking'. If the charging cable attached to the charging point contains a virus, there is no guarantee of data security of your phone. Even if you charge your phone with a cable at a public charging point, your device can still be hacked. Hackers steal data from your phone through juice jacking.


Hackers inject malware or viruses into your phone through cables connected to public charging points. Crawlers are a type of digital virus that steals information about your bank, credit card, or debit card from your phone and sends it to hackers. In a matter of seconds, the virus recovers.


  • Stealing data by inserting the virus into the phone:


Hackers also have another method of stealing phone data. This method does not immediately steal data by inserting a virus into the phone. Gradually, hackers collect all your information and use it as their own. For example, hackers find out where you are going, who you are meeting, what you are talking about. Not only that, but hackers can also use phone cameras, microphones, and even GPS by hacking through viruses. They can call another person from your phone through the virus. Hackers can steal all your data and demand money from you.


  • Ways to escape the clutches of hacking


* You have to be especially careful about charging the mobile.


* When you leave home, charge your phone and leave. If you can't charge the phone, keep the power bank with you.


* It is not safe to switch off and charge. This is because hackers can steal data even if the phone is turned off through flash memory.


* Can use a special type of USB cable. These cables do not connect to data mode. Just connect the charging pin to the port.


The biggest thing is to be a little careful. And when the charge is over, if there is no special need or urgent work, you can spend a few hours a day without mobile.


Category and Tags
More stories by
Intel Resuming Free Coffee and Tea After 15,000 Employee Layoffs

After cutting several employee benefits in an effort to save money, Intel has announced that it will once again provide free coffee and tea to its staff. Intel made the decision to fire 15,000 employees in August of this year. Intel reduced a nu

What are specified small mopeds in Japan?

In Japan, "specified small mopeds" (often referred to as tokutei kogata nirin or 特定小型二輪) are a category of very low-power, low-speed two-wheeled vehicles. This classification is part of Japan's efforts to make micro-mobility more accessib

why Japanese corporations are declining?

The combination of structural and economic competitiveness challenges in recent decades has led to a decline in Japanese firms Here are the main reasons for their decline.1. An aging population and a shrinking workforce:Japan’s population problem i

Is there an actual Tesla phone?

Although Tesla has refuted any plans to release a smartphone, rumours continue. It might be a logical progression of the business's connected auto ecosystem, according to analysts.There are a lot of rumours on the internet about a Tesla phone that is

Exploring "Social Business Misconception: Insights into Muhammad Yunus’s Social Business Theory"

Social business has emerged as a groundbreaking concept for addressing pressing societal challenges through self-sustaining business models. Pioneered by Nobel Peace Prize laureate P...

Follow Business Habit on Facebook, Twitter