Menu
24matins.uk
Navigation : 
  • News
    • Business
    • Recipe
    • Sport
  • World
  • Health
  • Culture
  • Tech
    • Science
Currently : 
  • Entertainment
  • Health
  • Tech
  • International

Public Charging Stations: How Hackers Steal Your Data—and Ways to Stay Safe

Tech
By 24matins.uk,  published 29 April 2025 at 7h33, updated on 29 April 2025 at 7h33.
Tech

Les stations de recharge publiques, de plus en plus présentes dans les lieux fréquentés, peuvent devenir des points d’accès pour des cybercriminels cherchant à dérober vos informations personnelles. Voici ce qu’il faut savoir pour éviter ces attaques lors du rechargement de vos appareils.

Tl;dr

  • Public chargers expose phones to new data theft risks.
  • Apple and Google update software to counter ChoiceJacking.
  • Personal chargers and updates offer best protection.
  • Rising Threats at Public Charging Stations

    Anyone who’s ever plugged their smartphone into a public charging port—perhaps in an airport or a bustling shopping centre—might want to pause before doing so again. Recent research has uncovered that seemingly innocuous public chargers can be weaponized, enabling attackers to pilfer data from unsuspecting users’ devices. The emerging technique, sometimes referred to as juice jacking, exploits vulnerabilities in the connection between device and charger, making it far more than a mere theoretical risk.

    The Evolution of Juice Jacking Attacks

    Efforts by major tech players have been ongoing for years to contain these threats. For over a decade, Apple and Google have actively bolstered device security against the manipulation of USB connections. Yet, a recent breakthrough by researchers at the Graz University of Technology in Austria revealed that existing defenses are not impenetrable. Their study demonstrated that sophisticated attacks can circumvent earlier protections, allowing for the extraction of sensitive files—photos, documents—from both iOS and Android systems.

    The Rise of ChoiceJacking—and Industry Responses

    A new attack vector called ChoiceJacking has drawn particular concern from security experts. In response, both Apple and Google rolled out key updates: following the Austrian researchers’ publication, Apple released iOS 18.4, which now prompts users for authentication—via PIN or password—before permitting any interaction with a locked iPhone connected through USB. Meanwhile, Google’s latest release of Android 15 extends this layer of defense to Pixel phones and other compatible Android models.

    Yet here’s the rub: despite these advancements, many widely used Android devices remain exposed. Delays in rolling out updates—or their absence altogether from some manufacturers—continue to leave millions at risk.

    Protecting Your Device: Practical Steps

    So what can users actually do? Several elements explain effective personal protection:

  • Avoid using public chargers whenever possible;
  • Cary your own trusted charging cable or an external battery pack;
  • Ensure your device runs the most recent software version.
  • While all iPhones receive timely updates simultaneously, Android’s fragmented ecosystem often leaves some phones behind. If you’re using an older or less mainstream model, vigilance is doubly important.

    In short, as attackers grow more creative and public chargers proliferate, the safest path is still relying on your own accessories. Adopting simple habits today could spare you significant headaches tomorrow—because if there’s one thing this research underscores, it’s that the threat is anything but hypothetical.

    Le Récap
    • Tl;dr
    • Rising Threats at Public Charging Stations
    • The Evolution of Juice Jacking Attacks
    • The Rise of ChoiceJacking—and Industry Responses
    • Protecting Your Device: Practical Steps
    • About Us
    © 2026 - All rights reserved on 24matins.uk site content