Charging Phones in a Public Place Can be the Reason Hacked Your Data


Smartphones have now brought the world in the palm of your hand. But hackers can steal all your information through smartphones. And that may be without your knowledge.


If you regularly charge your mobile phone or tablet (tab) at a charging point in a public place, such as an airport, train station, bus stand or cafe, it's time to be alert. Because hackers are currently targeting these charging points.


According to a report by the news agency UNB, charging batteries in public places can hack smartphones, iPhones, and tablets. This is what is happening in many countries now. One day you may be charging the phone, and on the other hand, all the information on your mobile phone is going to hackers. Even if the phone is removed from the charge in a public place, the danger is not diminishing. Because hackers can turn on your phone's WiFi through the charging port and use it as they wish.


  • Juice jacking:


In fact, hackers are hacking your smartphone or tablet through a technology called 'juice jacking'. If the charging cable attached to the charging point contains a virus, there is no guarantee of data security of your phone. Even if you charge your phone with a cable at a public charging point, your device can still be hacked. Hackers steal data from your phone through juice jacking.


Hackers inject malware or viruses into your phone through cables connected to public charging points. Crawlers are a type of digital virus that steals information about your bank, credit card, or debit card from your phone and sends it to hackers. In a matter of seconds, the virus recovers.


  • Stealing data by inserting the virus into the phone:


Hackers also have another method of stealing phone data. This method does not immediately steal data by inserting a virus into the phone. Gradually, hackers collect all your information and use it as their own. For example, hackers find out where you are going, who you are meeting, what you are talking about. Not only that, but hackers can also use phone cameras, microphones, and even GPS by hacking through viruses. They can call another person from your phone through the virus. Hackers can steal all your data and demand money from you.


  • Ways to escape the clutches of hacking


* You have to be especially careful about charging the mobile.


* When you leave home, charge your phone and leave. If you can't charge the phone, keep the power bank with you.


* It is not safe to switch off and charge. This is because hackers can steal data even if the phone is turned off through flash memory.


* Can use a special type of USB cable. These cables do not connect to data mode. Just connect the charging pin to the port.


The biggest thing is to be a little careful. And when the charge is over, if there is no special need or urgent work, you can spend a few hours a day without mobile.


Category and Tags
More stories by
Down: Facebook, Instagram, Messenger: Massive outage caused by meta platforms that abruptly stop functioning

It looks that parent company Meta is experiencing a significant outage that has affected Facebook, Instagram, and Messenger.Users discovered that they couldn't load the websites or apps normally. Affected users discovered that Instagram would not fun

Elon Musk lost the Richest person's crown! Who behind ?

World's Richest Man: For the first time since 2021, Amazon.com Inc. founder Bezos, 60, has topped Bloomberg's ranking of the richest people.Elon Musk is suddenly under pressure. For ...

Just when 5G network deployment is almost complete, telcos are already discussing "5.5G."

Spain's BARCELONA The deployment of 5G wireless mobile networks has not yet been completed by telecom providers. Nevertheless, leaders of significant carriers are already discussing the development of "5.5G," or "5G Advanced," technology.At the Mobil

Google Gemini's product lead withdraws from social media following an unsettling AI product launch that resulted in abuse

Important PointsJack Krawczyk, the Gemini Product Lead, has deleted content from his social media accounts in response to a recent wave of hostility.Elon Musk, the owner of social networking platform X, among other public figures and users have been

VR apps are tried in emergency evacuation drills at Japanese universities

In the Japanese prefecture of Fukushima in the northeast, a disaster evacuation drill utilizing an augmented reality app was conducted on Sunday. At an Iwaki City mall, about 110 locals and students gathered to test ...

Follow Business Habit on Facebook, Twitter