The only way to prevent juice jacking is to use a USB condom, which is not as crazy as it might sound. Hackers are looking for new ways to compromise people’s computers, and one way is through public USB ports.
You’re in a hurry, you’re grabbing a quick meal, and you see a USB port near the table, so you decide to charge your phone while you’re eating. It could be safe, but it could have been compromised by hackers looking to steal data or install malware on devices of unsuspecting users. This process, called juice jacking, is more common than you think.
The Los Angeles District Attorney’s Office is advising people to stay away from public USB power charging stations in airports, hotels and other locations because they could contain malware. It’s the last thing users would think about, but it’s like connecting your phone or laptop to an unsecured Wi-Fi network.
“In the USB Charger Scam, often called “juice jacking,” criminals load malware onto charging stations or cables they leave plugged in at the stations so they may infect the phones and other electronic devices of unsuspecting users. The malware may lock the device or export data and passwords directly to the scammer,” says the District Attorney office.
There are two ways to mitigate this problem. One would be to travel with a charger at all times, or at least use a second researchable battery. The second would be to a so-called USB condom, which is a rough but accurate description of the device.
A USB condom is a small interface that sits between your charging cable and the charging port itself. It blocks the data ports on the USB charging station, leaving only the current to pass through. It’s not overly complicated, but it works, and it’s a great way to stay safe while on the move.