Menu Close
Close

Hidden Cyber Traps in Public Places

Just when you thought you were safe from cyberattack, a not-so-new threat demands your attention! Did you know that charging your phone or device in an airport lounge or public charging station could place you at significant risk of a cyberattack?

Hidden Cyber Traps in Public Places

Just when you thought you were safe from cyberattack, a not-so-new threat demands your attention! 

 

Did you know that charging your phone or device in an airport lounge or public charging station could place you at significant risk of a cyberattack? 

Well, that is exactly the risk you may face when innocently plugging into one of the thousands of free charging stations and USB ports found in airports, train stations, hotels, cafés and even hire cars; virtually any public space with device charging facilities. 

Gone are the days of credit card readers strategically positioned on an ATM, where a card reader would capture your credentials and criminals would quickly empty your account. This is considered old technology and the bad guys have upped their game.  

So how does the next generation cybercriminal plant malicious software onto your device just from it being charged? 

When you plug your phone in to charge up, all of your personal data may be copied to the USB port that is supplying charge to your device. What kind of personal information can be accessed? All your passwords, banking data, contacts (names and addresses), photos and videos, text messages, emails etc.  

Furthermore, the same sinister port can upload malicious code to your phone without you knowing it’s even happened. 

So, what else can this malicious code do to your phone? Your microphone and camera can be remotely activated, all without your knowledge. Your conversations can be listened to and cybercriminals could potentially observe you in the privacy of your own home via the device cameras. 

How can you avoid these cyber traps? 

The best option is to buy a portable charger for your devices. These come in many different shapes and sizes. For a cheaper option, buy a USB port protector or better still, carry your phone charger with you and find a power point to connect to.  

Be prepared and you can reduce your cyber risk. Happy travelling! 


If your organisation is not clear on the cyber risks, or the solutions, Kloudwerk are here to help you. We fill your security gap by utillising seasoned security professionals in our affordable consulting packages. 

– We build an understanding of your organisation
– We develop a roadmap to address key risks
– We help you implement the required changes and keep your business protected on an ongoing basis. 

Visit our Cyber Consultancy page for more information

Share:

Facebook
Twitter
Pinterest
LinkedIn
On Key

Related Posts

WEBSITE SECURITY REPORT

GOLD

Imagine you own a house and want to add an additional floor. First you have to review and strengthen the foundations. This service builds cybersecurity foundations to facilitate growth in a resilient, timely manner.

This service will also provide the company with a cybersecurity risk assessment and improvement plan but with significantly more support from a senior consultant to help the company embed improvements in a continuous, timely manner

SILVER

The dreaded car MOT is looming. It’s the unforeseen wear & tear that results in some necessary annual maintenance. Our cybersecurity review will highlight what needs to be done as your engineers.

In addition to the context gathering stage and security footprinting service, a senior consultant will perform a risk assessment to understand the company’s cyber risks and provide recommendations. They will also be available to undertake monthly calls for answering questions, providing guidance and checking on whether risks are reducing.

BRONZE

You’re embarking on a more active lifestyle, chosen to go on a diet and get in shape. Think of this service as the cybersecurity equivalent of the personal trainer, helping you along the way.

After an initial context gathering stage, a junior security consultant will be available once per month to answer questions and provide recommendations based on company goals and activities. A cybersecurity footprinting service will allow the company to continuously monitor its external security posture.

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.