Destination Directory

Don’t Let Juice Jacking Leak Your Personal Data

Beware of juice jacking.

WHAT IS THAT? you ask.

Juice jacking is a term used to describe a cyberattack on a smartphone, tablet or other computer device via a public USB charging port—like the ones you find in airports, hotel lounges and shopping malls.

Scammers have hooked tiny computers into some of these ports. When you plug in your phone, they can install malicious programs on your devices that report back personal information they can use to commit identity theft. Or they can use the connection to your phone to search through your device's content and steal browsing history data, such as passwords.

Taking a few precautions can help you keep your personal information safe and secure.

Use a power plug.

The easiest way to thwart these hackers is to avoid using the USB charging ports ... But a phone's gotta charge when a phone's gotta charge, are we right? Plug your devices into an electrical outlet instead. Carry your power plug with you.

Use a charge-only cable.

There are two types of USB cables: data and charge-only. Charge-only cables are two conductor cables, rather than four, and can't transmit data. They also supply a higher current charge, which lends to faster charging. Score.

Pick up a battery.

Batteries aren't necessarily bricks anymore. Technology advancements have made them like Altoids—small and curiously powerful. A battery pack the size of a pen could refill your smartphone on a full charge.

Conserve power.

If you don't have safer charging devices with you, avoid using a public USB charging port by conserving your power.

Ensure your apps are updated before you venture out—developers constantly release new versions, in part, because they found ways to make things run more smoothly. On the other hand, disable auto-update; updates drain data and burn through battery life. Update apps manually when you're connected to Wi-Fi and have plenty of power.

If you're really desperate, even changing your wallpaper to all black can help add precious seconds to your power time.

Keeping your personal information private takes a bit of extra work and planning, but it's worth it to keep your identity and accounts safe and secure.

Written by Cassie Westrate, staff writer for Groups Today.


Add comment

Security code

Recent Blogs

Lessons Learned During 2017

Once again, the travel and tourism industry faces both new and ongoing challenges. Travel and tourism cannot be separated from the world context in which they operate. Be that context political states of war, or one of health issues or of economic undulations, what occurs throughout the world touches every aspect of tourism. It is for this reason that every once in a while, it is good for travel and tourism professionals to take a step back and to review at least some of the basic fundamentals of their industry.

Tour Planner Versus the Internet: Why (and How) the Travel Planner Will Win

We are in the midst of a digital transformation. More and more, travelers use the Internet to find travel inspiration and information. They can easily book flights and hotels—now more than ever, thanks to Google. There are apps to hail transportation, book table reservations and more.

10 Key Travel Moments from 2017

Each new year brings an air of hope. When the Trump administration instated the first travel ban in January, however, it looked like 2017 was off to a turbulent start for the travel industry. This year definitely had its rough patches, yet there were good things, too.

With each setback, the travel industry rallied together and proved that the industry isn't just an industry—but a community determined to change the world through remarkable destinations and extraordinary experiences.