Apple Phone Interface
While the closed iOS is much firmer compared to the open source Android, it's not completely risk-free. Trusted computers can sync with iOS devices, create backups, and access photos, videos, contacts, and other content on the device. Conversely if a computer is not trusted, it is blocked from accessing the content on your device.
There are also external storage devices on the market today with Lightning ports that can read content from photo apps if you choose to trust the device, so a phone charging station can do something like that.
Behind the Free Charge
All smartphones currently have a unified charging and data port, which means that when you connect the cable to your phone's charging station, you don't know whether you're connected to a charging head or a computer's USB port.
Some public charging stations will induce mobile phone users to turn on USB debugging, which effectively gives the phone's internal permissions to the other party entirely.
Once clicked on, computers, charging pads, etc. can be connected to the phone to secretly install phone software, or even malicious programs, for the person charging without consent.
In this way, the payment account, password, ID card information, contact information, photos and other private information in the consumer's mobile phone may be maliciously accessed by unscrupulous elements, which in turn can steal the mobile phone user's bank card.
It's a bit like hiding a person in an ATM, you deposit money into it and he counts it, but the hacking technique of using a mobile phone charging station as a cover is much more sophisticated than that. On the surface you think you're just charging, but behind the scenes your photos have been stolen by the charging station, and hackers can also take control of your phone to send text messages and even get verification codes to hack into payment apps.
In fact, it's not just charging stations that have the potential to be hacked into phones and steal information when connected to a charge. Even if you don't have a wired connection, hackers can break into your phone just as well. Check out this video below.
In the era of mobile Internet, people often use mobile devices for communication, exchange and financial transactions, so it is even more important to use them carefully to avoid leaking information.
1. When a phone accesses a mobile phone charging station, if the charging station requires a permission request, it is always denied. (including USB debugging and device trust)
2. Some cell phone charging posts have outlets provided, and it is best to charge with a device that you carry with you.
3. Some mobile phone charging posts only provide USB holes, if you encounter such mobile phone charging posts, please use a charging cable with charging function only (no data transfer function).
4. Turn the device off when using the cell phone charging station.
5.Be sure to install antivirus software on your phone and perform regular antivirus to avoid Trojan attacks.
6. Free WIFI in public places is likely to be used by hackers to commit illegal crimes, such as the use of free public WIFI, do not operate on the phone login password and other information to avoid leaks.
7. Carry a rechargeable battery with you and try not to use a public charging station.
Source: Capital Internet Police
>>1、Linux generates private and public keyfree connections2、How can entrepreneurs catch the wind of the big data industry3、Downloaded js file local editor open Chinese messy code how to solve4、A first look at KotlinSpringBoot joint programming5、Financial big data three application scenarios to boost marketing revenue