As the FBI warns that hackers are using public charging stations to steal your iPhone data… here’s how you can protect yourself from buggy ports
<!–
<!–
<!–<!–
<!–
<!–
<!–
If you connect your iPhone or iPad to a charger and see a message that says “Trust this computer,” a hacker has compromised the power supply. A simple press of ‘Do not trust’ will prevent data thieves from accessing the device
Cyber criminals have a knack for using public charging stations to infiltrate connected devices, but Apple has a secret weapon to protect you from juice jacking.
If you connect your iPhone or iPad to a charger and see a message that says “Trust this computer,” a hacker has compromised the power supply.
A simple press of ‘Don’t Trust’ will prevent data thieves from accessing the device.
The Federal Bureau of Investigation (FBI) issued a warning in April urging people not to connect to free power at malls, hotels and airports for fear of data theft.
Juice jacking, as it’s called, is when hackers install malicious code or cables into public USB chargers to read and steal data from and even track mobile devices.
“Malware installed through a corrupted USB port can brick a device or export personal data and passwords directly to the perpetrator,” the Federal Communications Commission (FCC) shared in its website.
“Criminals can use that information to access online accounts or sell it to other bad actors.”
While the cyber theft tactic has been around for quite some time, it has seen an increase in attacks that led the FBI to issue a warning in April.
“Everyday tasks (opening an email attachment, following a link in a text message, making an online purchase) can expose you to online criminals who want to damage your systems or steal from you,” the government’s website reads. FBI.

The Federal Bureau of Investigation (FBI) issued a warning in April urging people not to connect to free power at malls, hotels and airports for fear of data theft.

Juice jacking, as it’s called, is when hackers install malicious code or cables into public USB chargers to read and steal data from and even track mobile devices.
‘Preventing cybercrime and intrusions via the Internet requires each of us to be vigilant and on our guard.’
Another common tactic is to hack the end of a USB cable and then leave it plugged into a charging dock in the hope that people will use the hacker’s cable instead of rummaging through their bags to get theirs.
According to Los Angeles District Attorney Jackie Lacey, hackers have used malware on public USB charging stations to export data from a person’s phone, steal passwords, or block a user’s access to their device.
Unlike conventional power cables, USB cables are designed to carry data and power between two devices.
This double convenience comes at the cost of leaving an open data path to a person’s portable devices that conventional power cords don’t provide.
The FCC has also shared tips to protect your devices from cat juice.
The agency suggests using a traditional wall socket to plug in a charger, carrying an external battery, or “consider carrying a charge-only cable, which prevents data from being sent or received while charging, from a trusted provider.”
Another option is to buy special ‘no data transfer’ USB cables.
These specially made cables have connection pins that carry data pulled from the USB port, meaning there is no pathway for potential malware or viruses.
There are also a number of creatively named accessories to block data transfers over USB transfer, such as the Juice-Jack Defender.
These essentially act as an adapter between a public USB port and a person’s USB cable, preventing data from reaching the USB cable.
.