cool hit counter Charging like this is dangerous and can steal all the information from your phone in minutes!_Intefrankly

Charging like this is dangerous and can steal all the information from your phone in minutes!


A phone charge and your personal information is checked all over?

The kind of charging you're talking about today can seriously compromise your personal privacy, including private photos, address book information, files, etc., and can even remotely manipulate your phone for consumption.

Some public charging post facilities now have mobile phones that not only charge for free, but also for an unlimited amount of time. However, this free charging pile is hidden fishy: after mobile phone users connect the charging pile, their private photos are surprisingly accessed by others, and even their bank cards are also spent by others to buy movie tickets.

△Unauthorized elements use charging posts to remotely manipulate chargers' phones

Police analysis: uncovering the principle of charging post invasion

The charging station will prompt the user to enable USB debugging or trust the device

User clicks agree to make some of the phone's permissions open

(The key point of intrusion is that we allow access to external devices)

(Android phone △ USB debugging function open carefully)

Take Android phones as an example, in fact, all smartphones have "USB debugging mode". With the help of a debugging tool on your computer, you can control your phone by running commands. Similar to the difference between programming language and speaking, you feel like just tapping the screen while using your phone, the same way a hacker can do all the operations through code commands.

When the phone is connected to the charging station's data cable, what is connected behind it may be a computer with a phone debugging tool, and the hacker can easily take away the control of the phone by just tapping the appropriate command code.

Apple Phone Interface

While the closed iOS is much firmer compared to the open source Android, it's not completely risk-free. Trusted computers can sync with iOS devices, create backups, and access photos, videos, contacts, and other content on the device. Conversely if a computer is not trusted, it is blocked from accessing the content on your device.

There are also external storage devices on the market today with Lightning ports that can read content from photo apps if you choose to trust the device, so a phone charging station can do something like that.

Behind the Free Charge

All smartphones currently have a unified charging and data port, which means that when you connect the cable to your phone's charging station, you don't know whether you're connected to a charging head or a computer's USB port.

Some public charging stations will induce mobile phone users to turn on USB debugging, which effectively gives the phone's internal permissions to the other party entirely.

Once clicked on, computers, charging pads, etc. can be connected to the phone to secretly install phone software, or even malicious programs, for the person charging without consent.

In this way, the payment account, password, ID card information, contact information, photos and other private information in the consumer's mobile phone may be maliciously accessed by unscrupulous elements, which in turn can steal the mobile phone user's bank card.

It's a bit like hiding a person in an ATM, you deposit money into it and he counts it, but the hacking technique of using a mobile phone charging station as a cover is much more sophisticated than that. On the surface you think you're just charging, but behind the scenes your photos have been stolen by the charging station, and hackers can also take control of your phone to send text messages and even get verification codes to hack into payment apps.

In fact, it's not just charging stations that have the potential to be hacked into phones and steal information when connected to a charge. Even if you don't have a wired connection, hackers can break into your phone just as well. Check out this video below.

In the era of mobile Internet, people often use mobile devices for communication, exchange and financial transactions, so it is even more important to use them carefully to avoid leaking information.

Police Reminder

1.When a phone accesses a mobile phone charging station, if the charging station requires a permission request, it is always denied. (including USB debugging and device trust)

2.Some of the cell phone charging posts have outlets provided to charge with the devices you carry with you.

3.Some mobile phone charging posts only provide USB holes, if you encounter such mobile phone charging posts, please use a charging cable with charging function only (no data transfer function).

4.Turn the device off when using the cell phone charging station.

5.Be sure to have antivirus software installed on your phone. Install antivirus software on your phone and perform regular antivirus to avoid Trojan attacks.

6.Free WIFI in public places is likely to be used by hackers to commit illegal crimes, such as the use of free public WIFI, do not operate on the phone login password and other information to avoid leaks.

7.Carry a rechargeable battery with you and try not to use a public charging station.


Recommended>>
1、Internet medical sector active digital China concept counter trend strong
2、python making minigames II
3、Facebook had considered analyzing its users personalities and using that information to target ads
4、How is data shared and quality controlled Wang Leheng Hao Xiangshe Gu Weiyue Yu Le
5、Update Oxford xDeepMind Natural Language Processing Lecture 8 above Attention Models

    已推荐到看一看 和朋友分享想法
    最多200字,当前共 发送

    已发送

    朋友将在看一看看到

    确定
    分享你的想法...
    取消

    分享想法到看一看

    确定
    最多200字,当前共

    发送中

    网络异常,请稍后重试

    微信扫一扫
    关注该公众号