Gadget to combat juice jacking
DataBlock is set to launch its latest product that will prevent data theft from smart devices while allowing powering up at charging stations.
Did you know according to the South African Banking Risk Information Centre (SABRIC) South Africa has the third highest number of cyber crime victims worldwide, resulting in a loss of about R2.2 billion each year to cyber attacks.
Many of these occur when charging a smart device in a public charging station.
In its race towards thinner, smarter phones, the mobile sector cannot always promise optimum battery life, and therefore the charging stations are becoming increasingly popular. Public meeting places like coffee shops, offices and airport lounges offer the service of free charging ports and this technological trend is where a new cyber attack vector known as Juice Jacking comes to the fore.
Coined back in 2011, Juice Jacking is a cyber attack that commonly involves the installation of malware on to smartphones when inserting them into a USB charging terminal. This malware subsequently copies all the data stored on that device.
The tech used to compromise a public USB charging point is easily available and therefore puts many of its users at risk.
Simply put DataBlock is a USB connection that, when added to your charger, will prevent your private information and data being stolen by a third party.
USB charging ports pose a security risk as they transfer power but, in the process, could and usually do transfer data. This could mean images, phone numbers, passwords, which if in the wrong hands, can be very dangerous.
“Fraudsters use this hacking system to enter into smart devices illegally and not only steal information but inject harmful malware into the device,” explains Bartkunsky.
Protecting our data inclusive of images, videos, banking details and passwords is vital which is why this is such a revolutionary piece of technology. It is safe, compact, easy to use, carry around and allows consumers to charge their phones without the anxiety of being hacked by cutting off all connections of the data transfer pins in the USB port while still allowing the power supply to flow through the device.