cool hit counter Charging like this is dangerous and can steal all the information from your phone in minutes! A little parental mastery of "congregational education" can benefit a child for life!_Intefrankly

Charging like this is dangerous and can steal all the information from your phone in minutes! A little parental mastery of "congregational education" can benefit a child for life!


Source: Safe South Guangdong, the following graphics, expensive to share, the copyright belongs to the original author and the original source, the content is the author's opinion, does not mean that this public number endorses its views and is responsible for its authenticity. Please contact us promptly if there are any copyright or other issues.

A phone charge and your personal information is checked all over?

Today's talk about this type of charging

It can seriously compromise your privacy.

Includes private photos, address book information, files, etc.

It can even remotely control your phone for consumption

Some public charging post facilities now have mobile phones that not only charge for free, but also for an unlimited amount of time. Yet there is something fishy in this free charging post: the After mobile phone users connected to the charging station, their private photos were surprisingly accessed by others, and even their bank cards were spent by others to buy movie tickets.

Lawbreakers use charging posts to remotely manipulate chargers' phones

Police analysis: uncovering the principle of charging post invasion

The charging station will prompt the user to enable USB debugging or trust the device

User clicks agree to make some of the phone's permissions open

(The key point of intrusion is that we allow access to external devices)

(Android phone USB debugging function is turned on carefully)

Take Android phones as an example, in fact, all smartphones have "USB debugging mode". With the help of a debugging tool on your computer, you can control your phone by running commands. Similar to the difference between programming language and speaking, you feel like just tapping the screen while using your phone, the same way a hacker can do all the operations through code commands.

When the phone is connected to the charging station's data cable, what is connected behind it may be a computer with a phone debugging tool, and the hacker can easily take away the control of the phone by just tapping the corresponding command code.

Apple Phone Interface

While the closed iOS is much firmer compared to the open source Android, it's not completely risk-free. Trusted computers can sync with iOS devices, create backups, and access photos, videos, contacts, and other content on the device. Conversely if a computer is not trusted, it is blocked from accessing the content on your device.

There are also external storage devices on the market today with Lightning ports that can read content from photo apps if you choose to trust the device, so a phone charging station can do something like that.

Behind the Free Charge

All smartphones currently have a unified charging and data port, which means that when you connect the cable to your phone's charging station, you don't know whether you're connected to a charging head or a computer's USB port.

Some public charging stations will induce mobile phone users to turn on USB debugging, which effectively gives the phone's internal permissions to the other party entirely.

Once clicked on, computers, charging pads, etc. can be connected to the phone to secretly install phone software, or even malicious programs, for the person charging without consent.

In this way, the payment account, password, ID card information, contact information, photos and other private information in the consumer's mobile phone may be maliciously accessed by unscrupulous elements, which in turn can steal the mobile phone user's bank card.

It's a bit like hiding a person in an ATM, you deposit money into it and he counts it, but the hacking technique of using a mobile phone charging station as a cover is much more sophisticated than that. On the surface you think you're just charging, but behind the scenes your photos have been stolen by the charging station, and hackers can also take control of your phone to send text messages and even get verification codes to hack into payment apps.

In fact, it's not just charging stations that have the potential to be hacked into phones and steal information when connected to a charge. Even if you don't have a wired connection, hackers can break into your phone just as well. Check out this video below.

In the era of mobile Internet, people often use mobile devices for communication, exchange and financial transactions, so it is even more important to use them carefully to avoid leaking information.

Police Reminder

1. When a phone accesses a mobile phone charging station, if the charging station requires a permission request, it is always denied. (including USB debugging and device trust)

2. Some of the cell phone charging posts have outlets provided to charge with the devices you carry with you.

3. Some mobile phone charging posts only provide USB holes, if you encounter such mobile phone charging posts, please use a charging cable with charging function only (no data transfer function).

4. Turn the device off when using the cell phone charging station.

5. Be sure to have antivirus software installed on your phone. Install antivirus software on your phone and perform regular antivirus to avoid Trojan attacks.

6. Free WIFI in public places is likely to be used by hackers to commit illegal crimes, such as the use of free public WIFI, do not operate on the phone login password and other information to avoid leaks.

7. Carry a rechargeable battery with you and try not to use a public charging station.


Recommended>>
1、Enter the mobile Internet to enable mobile domain name Shizuishan station
2、Central government comprehensive financial sector statistics must achieve full coverage
3、Seeno Group FTC FTA chain is about to become a global FTA supercarrier
4、Zhonglu Agriculture video conference on precise poverty alleviation work
5、Behind Blockchain Digital Identity Reshaping Government Public Services

    已推荐到看一看 和朋友分享想法
    最多200字,当前共 发送

    已发送

    朋友将在看一看看到

    确定
    分享你的想法...
    取消

    分享想法到看一看

    确定
    最多200字,当前共

    发送中

    网络异常,请稍后重试

    微信扫一扫
    关注该公众号