Juice Jacking

In this cyberattack, attackers set up a public USB charging port to install malware or extract data from a device. This gives the hackers access to sensitive information like credit card details, login credentials, and any other vital, private information stored on or connected to the device. 

The hackers can also install malware to log keystrokes, send intrusive ads, or make your device part of a botnet.

Preventing juice jacking

  • Avoid public charging stations. If necessary, carry your cable and use a wall outlet—or perhaps wireless charging if available.
  • Enhance security with additional measures. Do not allow your device to pair via USB, install antimalware software on it, and only charge it when it’s turned off.