How to Protect Your Phone or Tablet From Juice Jacking Hacking

Updated on February 12, 2020
clivewilliams profile image

An I.T. Professional with over 15 years in the industry. A Microsoft Certified Professional, Microsoft Certified Systems Administrator.

Juice Jacking Hacking
Juice Jacking Hacking

Protect Your Phone or Tablet From Juice Jacking

Never heard of the term juice jacking? Well, let me enlighten you on this extremely important piece of information. Juice jacking is a term given to the process of someone hacking and infecting your phone or tablet with spyware or malware when you plug it into a public charging station.

Public charging stations include parks, airports, coffee shops, internet stations, libraries, etc. Anywhere where anyone can plug in their charger to charge their device. So how do hackers infect your phone with this secret malware? Well, when you plug into the public charging station, everything will look quite fine. Your device will be getting power and will begin to charge, but what you don’t see hidden behind the charging station is a device that infects your phone with this dangerous malware.

What Happens When Your Phone or Tablet Gets Infected?

Once the malware has infiltrated your phone via your charger, the hacker will have access to basically everything on your phone. Your phone is no longer yours as the software allows the hacker to control applications and read all information on your device. The secret malware allows the hacker to read your text messages, see your contacts, view your online transactions and worst, and see your bank and bank account.

Another bad thing about juice jacking is that once you unplug from the public charging station, the malware remains on your device and the hacker still has total control of your phone. The hacker is able to even control your phones camera and can take pictures of you or your surroundings at will. This my friend is a very scary hack.

Juice Jacking hacking
Juice Jacking hacking

How Do You Protect Your Device?

  • For juice jacking, your best bet is to simply do not use public charging stations. You can simply purchase a power bank and keep that fully charged. When your phone or tablet runs out of battery power, just plug your phone into your power bank for recharge.
  • Your next best bet to prevent hackers from hacking your phone when using a public charging station is to get yourself an USB Data Blocker. A data blocker is a simple cheap small device which looks like a flash drive that you plug into your devices USB Port and then plug the charger into the data blocker. The data blocker allows your phone to be charged while blocking any form of data transfer. This means that malware will not be able to be transferred to your device.

What to Do If You Believe Your Phone Is Hacked and Infected

  1. Turn off your phone's antenna so it is unable to send or receive any kind of signals. This will stop any kind of transfer between your device and the hacker which may be going on that you are unable to see.
  2. If you have a good anti-malware software on your phone or tablet that is updated with the latest virus and malware definitions (definitions are codes which are capable of detecting new virus or malware), scan your phone and the anti-malware may be able to remove the infection.
  3. If the anti-malware is unable to remove the malware, you next option is to perform a factory rest of your device. The factory reset is like formatting your phone to a clean slate. This means that you will need to backup your contacts and other important data before doing this as after the factory reset, you will lose all of this information.

Juice Jacking Is Dangerous Just as Any Other Hack

Juice jacking is dangerous due to to fact that people are quite unaware that by plugging your phone into a public charging station it is capable of being infected. Charge stations are used by millions of people worldwide. It is actually giving the hacker a direct way by a physical connection to hack your device. Always have a device such as a data blocker around to block these unscrupulous people from accessing your personal information. It is your duty to ensure your own digital privacy. Be safe on or offline.

© 2020 Clive Williams

Comments

    0 of 8192 characters used
    Post Comment
    • profile image

      Rafael Vogel 

      5 weeks ago

      Thanks for sharing. Never heard about this kind of hacking. A simple advise would be: Never plug into USB's. Use your own charger (outlet or power bank).

    • clivewilliams profile imageAUTHOR

      Clive Williams 

      7 weeks ago from Jamaica

      thats right Flourish

    • clivewilliams profile imageAUTHOR

      Clive Williams 

      7 weeks ago from Jamaica

      you are welcome Pam

    • FlourishAnyway profile image

      FlourishAnyway 

      7 weeks ago from USA

      I didn’t know this was a thing. People are so evil smart.

    • Pamela99 profile image

      Pamela Oglesby 

      7 weeks ago from Sunny Florida

      I didn't know hacking was called juice jacking. I think there is some good advice in your article. Thanks Clive.

    • clivewilliams profile imageAUTHOR

      Clive Williams 

      7 weeks ago from Jamaica

      Ok Eric...

    • Ericdierker profile image

      Eric Dierker 

      7 weeks ago from Spring Valley, CA. U.S.A.

      I tried but this is over my head -- expect a note if I need help.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, turbofuture.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://maven.io/company/pages/privacy

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
    ClickscoThis is a data management platform studying reader behavior (Privacy Policy)