TechPublic USB ports may infect your phone with malware, experts warn

Public USB ports may infect your phone with malware, experts warn

Experts are raising a warning. They've highlighted the issue of 'juice jacking', a process where USB ports are infected with harmful programs. If the port is part of a public charger, your smartphone could unknowingly download damaging apps and viruses upon connection.

Charging the phone
Charging the phone
Images source: © Pixabay

11:33 PM EST, January 15, 2024

Another concern is raised. Since information can be transferred both ways, data from your smartphone can also be sent to the socket. This data can then potentially be seized by hackers.

The American experts concluded from experiences that a mere 80 seconds of charging could potentially infect your device with unwanted software. Thus, the U.S. Army Cyber Command advises carrying your own USB cable and charger to avoid this risk. In need of power, you can plug these into an electrical outlet, which is used solely for power transmission – announced the department via a press release.

Infected ports? Some remain skeptical

Some experts are skeptical about the concept of 'infected' ports. They debate the validity of the claim, stating they've never heard of such breaches. They also argue that modern smartphones alert owners to any attempted data transfers. Nonetheless, it's advised to maintain vigilance.

Related content
© essanews.com
·

Downloading, reproduction, storage, or any other use of content available on this website—regardless of its nature and form of expression (in particular, but not limited to verbal, verbal-musical, musical, audiovisual, audio, textual, graphic, and the data and information contained therein, databases and the data contained therein) and its form (e.g., literary, journalistic, scientific, cartographic, computer programs, visual arts, photographic)—requires prior and explicit consent from Wirtualna Polska Media Spółka Akcyjna, headquartered in Warsaw, the owner of this website, regardless of the method of exploration and the technique used (manual or automated, including the use of machine learning or artificial intelligence programs). The above restriction does not apply solely to facilitate their search by internet search engines and uses within contractual relations or permitted use as specified by applicable law.Detailed information regarding this notice can be found  here.