cool hit counter Charging like this is dangerous and can steal all the information from your phone in minutes!_Intefrankly

Charging like this is dangerous and can steal all the information from your phone in minutes!

A phone charge and your personal information is checked all over?

Today's talk about this type of charging

It can seriously compromise your privacy.

Includes private photos, address book information, files, etc.

It can even remotely control your phone for consumption

Some public charging post facilities now have mobile phones that not only charge for free, but also for an unlimited amount of time. Yet there are hidden dangers in these free charging posts. After mobile phone users connected to the charging station, their private photos were surprisingly accessed by others, and even their bank cards were spent by others to buy movie tickets.

△Unauthorized elements use charging posts to remotely manipulate chargers' phones

Police analysis: uncovering the principle of charging post invasion

The charging station will prompt the user to enable USB debugging or trust the device

User clicks agree to make some of the phone's permissions open

(The key point of intrusion is that we allow access to external devices)

(Android phone △USB debugging function open carefully)

Take Android phones as an example, in fact, all smartphones have "USB debugging mode". With the help of a debugging tool on your computer, you can control your phone by running commands. Similar to the difference between programming language and speaking, you feel like just tapping the screen while using your phone, the same way a hacker can do all the operations through code commands.

When the phone is connected to the charging station's data cable, what is connected behind it may be a computer with a phone debugging tool, and the hacker can easily take away the control of the phone by just tapping the appropriate command code.

Apple Phone Interface

While the closed iOS is much firmer compared to the open source Android, it's not completely risk-free. Trusted computers can sync with iOS devices, create backups, and access photos, videos, contacts, and other content on the device. Conversely if a computer is not trusted, it is blocked from accessing the content on your device.

There are also external storage devices on the market today with Lightning ports that can read content from photo apps if you choose to trust the device, so a phone charging station can do something like that.

Behind the Free Charge

All smartphones currently have a unified charging and data port, which means that when you connect the cable to your phone's charging station, you don't know whether you're connected to a charging head or a computer's USB port.

Some public charging stations will induce mobile phone users to turn on USB debugging, which effectively gives the phone's internal permissions to the other party entirely.

Once clicked on, computers, charging pads, etc. can be connected to the phone to secretly install phone software, or even malicious programs, for the person charging without consent.

In this way, the payment account, password, ID card information, contact information, photos and other private information in the consumer's mobile phone may be maliciously accessed by unscrupulous elements, which in turn can steal the mobile phone user's bank card.

It's a bit like hiding a person in an ATM, you deposit money into it and he counts it, but the hacking technique of using a mobile phone charging station as a cover is much more sophisticated than that. On the surface you think you're just charging, but behind the scenes your photos have been stolen by the charging station, and hackers can also take control of your phone to send text messages and even get verification codes to hack into payment apps.

In fact, it's not just charging stations that have the potential to be hacked into phones and steal information when connected to a charge. Even if you don't have a wired connection, hackers can break into your phone just as well. Check out this video below.

In the era of mobile Internet, people often use mobile devices for communication, exchange and financial transactions, so it is even more important to use them carefully to avoid leaking information.

Police Reminder

1. When a phone accesses a mobile phone charging station, if the charging station requires a permission request, it is always denied. (including USB debugging and device trust)

2. Some of the cell phone charging posts have outlets provided to charge with the devices you carry with you.

3. Some mobile phone charging posts only provide USB holes, if you encounter such mobile phone charging posts, please use a charging cable with charging function only (no data transfer function).

4. Turn the device off when using the cell phone charging station.

5. Be sure to have antivirus software installed on your phone. Install antivirus software on your phone and perform regular antivirus to avoid Trojan attacks.

6. Free WIFI in public places is likely to be used by hackers to commit illegal crimes, such as the use of free public WIFI, do not operate on the phone login password and other information to avoid leaks.

7. Carry a rechargeable battery with you and try not to use a public charging station.

New Media Editor: Shan Guo

Special Recommendation

1、Hubei Provincial Tobacco Bureau held the first network security technology exchange meeting of the provincial bureau
2、Fountainhead creates economic data operation monitoring and early warning system
3、While you are working overtime in the north your counterparts in Chengdu are jerking off and rubbing mahjong a call from Chenhan Information the leading Chengdu Block Company
4、IBM pushes worlds smallest computer the size of a grain of salt costs less than a dime
5、L4 level autonomous driving cars going sideways this car company wants to redefine human mobility

    已推荐到看一看 和朋友分享想法
    最多200字,当前共 发送