TSA's plea: Don't make these airport Wi-Fi and public charging mistakes this holiday
Briefly

TSA's plea: Don't make these airport Wi-Fi and public charging mistakes this holiday
"Using a process called juice jacking, someone can install software on these airport charging ports that automatically transmits data -- including passwords and other sensitive information -- from your connected device. In some cases, your phone might lock down, preventing you from acting quickly to stop anything. In other cases, you won't know anything is compromised until it's too late."
"As of 2023, the FCC said it had no confirmed cases of criminal activity through juice jacking but admitted that it was technically possible, so travelers should be on the lookout. The TSA also warns against using public Wi-Fi. The danger there isn't the service itself, but who else is connected. If you're shopping or accessing bank information, someone else on the same network could be using a specialized tool to capture data coming from your device."
Public USB charging ports and unsecured airport Wi‑Fi can expose devices to malware and data interception through techniques like juice jacking. Juice jacking can install software on charging ports that transmits passwords and other sensitive information, and infected devices may lock down or show no immediate signs of compromise. The FBI warned about this risk previously, and the FCC in 2023 said no confirmed criminal cases existed but acknowledged technical possibility. Travelers should avoid public chargers and networks when handling sensitive information. Recommended protections include power-only cables or adapters, portable power banks, USB data blockers, AC chargers, and VPNs; power bank rules may change.
Read at ZDNET
Unable to calculate read time
[
|
]