Translate

Friday, September 21, 2012

Data Theft Fear for Mobile Charging Stations


Mobile charging stations are popping up everywhere, and they seem like a boon for travelers who have to spend lengthy amounts of time between hotel rooms and home. They sometimes come complete with an array of different connectors for most popular devices. Others have USB outlets that enable you to use your own cable to recharge. Either way, all you have to do is plug in, and you're good to go. 
 
Unfortunately the first signs of concern are starting to emerge that charging your cell phone or other mobile device at one of these stations could become a security risk. At a hackers' conference, tech experts have shown how a charging station could be rigged with a concealed computer that invisibly downloads data from every device that is plugged in. Their setup apparently carried a warning about not trusting mobile charging stations but declaring that this particular one was safe. 
 
That was enough to encourage 360 attendees to accept this pledge and plug in their devices! If they don't know better, who does?
"Anyone who had an inclination to, could put a system inside of one of these kiosks that, when someone connects their phone, can suck down all of the photos and data, or write Malware to the device," one of the builders told security blogger Brian Krebs.
The organizers coined the term "juice jacking" and demonstrated that, provided devices had combined power and data ports (as most cell phones do), there was little or nothing users could do to prevent their data being stolen. It's fair to point out that, at the time of this writing, there have been no reported incidents of genuine juice jacking. 
 
But given the attractions of the potential haul of stolen data, security experts believe it's only a matter of time before rigged mobile charging stations make their appearance. As a blogger for security firm Sophos noted: "(I)f entire fake Apple and even IKEA stores can spring up in China, it's not hard to imagine that fake, or at least booby-trapped, charging stations might appear anywhere in the world." This wouldn't be difficult or expensive to do either. A quick Internet search reveals scores of different mobile charging stations for sale starting from just a couple of hundred dollars. Several of these are free-standing devices that could be set up anywhere there's an available power supply – in a mall, for example. Obviously, if and when this crime emerges, there are likely to be some mobile charging device locations that are safer than others. 
 
For instance, crooks and scammers would find it difficult to tamper with or set up a device at an airport or hotel lobby, which happen to be where many people recharge their cell phones and other mobiles devices. But several security specialists suggest we should get into the habit of not using these mobile charging stations at all. So the question was asked: “Would simply switching off your phone before plugging in be enough? “
Probably not,” says Sophos. “For a start, many people don't know how to fully power down their cellphones, believing them to be off when they're really in standby mode.”
And it seems that, under certain circumstances, even if they are fully off, crooks may still be able to access data on Secure Digital (SD) cards as well as a phone's main memory. In another test at the hackers' conference, when a user switched off the data transfer setting on their phone, it immediately switched back on as soon as a recharging cable was plugged in. 
 
But all is not lost. There are several actions you can take to protect your data, as suggested by the Sophos blogger:
  • First, and most obviously, take your own charging adapter and cable with you and find a power outlet where you can recharge. Not so convenient as mobile charging stations but clearly less risky. 
     
  • Use a USB cable that transfers power only. You can buy these leads, which have the data pins missing, for around $15 -- though they may not be suitable for all devices. 
     
  • Use a solar power recharger. 
     
  • Carry or buy an emergency battery or battery-charging pack. 
     
  • If you can or know how to (check your user manual), password-protect the data transfer feature on your device before recharging it. 
     
  • Notwithstanding the concerns expressed above, if you can, fully power down your phone if you really have to use a mobile charging station.
A couple more words of warning:
Remember that if you plug your recharging/data cable into someone else's computer via their USB port, your device could be at risk if the computer has been rigged by either the owner of via malware to steal data. And if someone else asks to plug their phone into your PC, there's a similar risk of it stealing data from your computer. Even if you believe the person to be trustworthy, there's a risk their mobile device could be infected with a virus (though this doesn't apply to iPhones). 
 
The more people are on the move, the more dependent we become on our cell phones and other devices, but, given future risks, it makes sense not to become equally dependent on mobile charging stations. 
 
-Birdy

No comments:

Post a Comment

Please be considerate of others, and please do not post any comment that has profane language. Please Do Not post Spam. Thank you.

Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)