1

Never Borrow Someone Else’s Charging Cable

Your smartphone is low on power and you’ve left your charging cable at home. What are you going to do? Probably, you will borrow one from a restaurant administrator, your hotel’s front desk clerk, or a passenger at the airport. Cybersecurity experts say that it would be a huge mistake.

Cyber experts believe you should never borrow someone else’s chargers. It’s like borrowing underwear, and you don’t do this. Hackers have learned how to implant malware in charging cables and remotely hijack mobile devices or computers. The technology itself is compact and inexpensive. It can be easily used both for attacks against random people as well as for targeted attacks.

A more serious threat is the USB charging stations for gadgets. They are often located in public places such as shopping malls or airports. There were cases where such USB stations been hacked. Hackers received access to everything that was plugged into stations. One of the important cyber-hygiene rules is to be careful about everything you plug into your gadgets (flash drives, cables, other devices, etc.). That is as important as not opening strange attachments, not clicking on unfamiliar links or passing passwords to third parties. Connecting someone else’s cable to your computer means to give the attacker all the necessary data to access.

Related Posts

card__image

Ransomware Attack Shut US Gas Pipeline

Sorry, this entry is only available in Russian. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. Февраль ещё не закончился, а уже стал тяжелым месяцем для нефтегазовой промышленности. Хакерам удалось провести сразу несколько несвязанных между собой атак с […]

card__image

Fasten Your Cyber Belts

There are 330 million connected cars in the world, and their number is growing rapidly. According to Upstream Security, from 2016 to 2019, the number of automotive cybersecurity incidents increased by 605%. Some figures: 57% of the attacks were by criminals for disruption, theft or ransom, 38% by researchers as a warning, to test systems security. […]

card__image

How Hackers Use Famous Companies

Sorry, this entry is only available in Russian. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. Киберпреступники стали чаще выдавать себя за известные бренды и подделывать ссылки на их сайты для фишинга. Среди узнаваемых имен, которые используют в […]

Leave a Reply

Your email address will not be published. Required fields are marked *