{"id":16508,"date":"2023-07-04T09:57:03","date_gmt":"2023-07-04T09:57:03","guid":{"rendered":"https:\/\/businessadapter.es\/on-vacation-be-careful-where-you-charge-your-cell-phone\/"},"modified":"2024-12-11T10:44:24","modified_gmt":"2024-12-11T10:44:24","slug":"on-vacation-be-careful-where-you-charge-your-cell-phone","status":"publish","type":"post","link":"https:\/\/businessadapter.es\/en\/on-vacation-be-careful-where-you-charge-your-cell-phone\/","title":{"rendered":"<strong>On vacation, be careful where you charge your cell phone<\/strong>"},"content":{"rendered":"\n<h1><span style=\"color: #800000;\"><strong>On vacation, be careful where you charge your cell phone<\/strong><\/span><\/h1>\n<p style=\"text-align: justify;\">Normally, we are cautious about leaving home with our devices charged, as just the thought of running out of battery is a nightmare we don&#8217;t want to be the protagonist of.<\/p>\n<p style=\"text-align: justify;\">However, it may happen that due to prolonged use of the device or other reasons, you run out of battery and we are sure that you will look for a nearby charging point to have your device operational again, without thinking beyond that. But there are dangers that you should be aware of when charging your cell phone away from home. <\/p>\n<h3><span style=\"color: #000000;\"><strong>What is juice-jacking?<\/strong><\/span><\/h3>\n<p>The idea behind <strong>juice-jacking <\/strong>is to take advantage of the devices&#8217; need for charging and users&#8217; trust by connecting them to unknown USB ports, to gain unauthorized access to information (photos, contacts, emails, etc.) or to introduce malicious software<a href=\"https:\/\/businessadapter.es\/ciberseguridad\/\">(malware<\/a>) on the devices (smartphone, laptop, tablet, etc.).<\/p>\n<p>Another version of this type of cyber attack is video-jacking. <strong><em>video-jacking<\/em><\/strong><em>which <\/em>is the copying of our screen and everything that is projected on it, with the data being sent to the <a href=\"https:\/\/businessadapter.es\/ciberataque\/\">cybercriminal<\/a>.<\/p>\n<p style=\"text-align: justify;\">In a USB there are 4 pins, 2 of which are for recharging the device, and the other 2 are for data transmission. It is through the latter that cybercriminals obtain our personal information. <\/p>\n<h4><strong>Public charging points<\/strong><\/h4>\n<p>Surely at some point you have needed to charge your device and wherever you have found yourself you have looked for a public charging point, such as those at airports, train and bus stations, or in shopping malls.  <a href=\"https:\/\/businessadapter.es\/en\/do-you-know-what-to-do-in-the-event-of-a-security-breach\/\"><img decoding=\"async\" class=\" wp-image-12539 alignright\" src=\"https:\/\/businessadapter.es\/wp-content\/uploads\/2023\/07\/pexels-stanley-ng-4387770-300x200.jpg\" alt=\"\" width=\"497\" height=\"331\" srcset=\"https:\/\/businessadapter.es\/wp-content\/uploads\/2023\/07\/pexels-stanley-ng-4387770-300x200.jpg 300w, https:\/\/businessadapter.es\/wp-content\/uploads\/2023\/07\/pexels-stanley-ng-4387770-1024x683.jpg 1024w, https:\/\/businessadapter.es\/wp-content\/uploads\/2023\/07\/pexels-stanley-ng-4387770-768x512.jpg 768w, https:\/\/businessadapter.es\/wp-content\/uploads\/2023\/07\/pexels-stanley-ng-4387770-1536x1024.jpg 1536w, https:\/\/businessadapter.es\/wp-content\/uploads\/2023\/07\/pexels-stanley-ng-4387770-2048x1365.jpg 2048w, https:\/\/businessadapter.es\/wp-content\/uploads\/2023\/07\/pexels-stanley-ng-4387770-900x600.jpg 900w\" sizes=\"(max-width: 497px) 100vw, 497px\" \/><\/a><\/p>\n<p>These public charging points are where they are often manipulated by <a href=\"https:\/\/businessadapter.es\/ciberataque\/\">cyber attackers<\/a>, so that when our devices are connected, malware is installed without us even realizing it.<\/p>\n<p>The same can happen if someone lends you their charger or it is &#8220;forgotten&#8221; in a socket. Also if we charge them in a restaurant, the train or bus where we travel, or even in the center where we go regularly. <\/p>\n<h4><strong>Specific recommendations for juice<\/strong> <strong>jacking<\/strong><\/h4>\n<p>The first recommendation, as we have already mentioned, is to always carry your cell phone or device with a charged battery from home, as this is the safest option of all.<\/p>\n<p>If this is not possible or we have forgotten to do so, it is advisable to take one of these options with us:<\/p>\n<p>1-. Una bater\u00eda port\u00e1til (<em>power Banks<\/em>) con carga suficiente. <\/p>\n<p>2-. Un cable de carga propio, para no utilizar el que nos ofrezcan en los puntos de recarga. <\/p>\n<p>3-. Utilizar cables con funcionalidad \u00fanica de carga. <\/p>\n<p>4-. Desactivar en nuestro dispositivo la opci\u00f3n de \u201ctransferencia de datos\u201d o en \u201cAjustes de USB\u201d activar la opci\u00f3n de \u201cSolo carga\u201d. <\/p>\n<p>5-. Uso de un bloqueador de USB, en donde se bloquea la transmisi\u00f3n de datos de los pines que componen el USB. <\/p>\n<h4><strong>General security recommendations for your devices<\/strong><\/h4>\n<p>In addition to the specific recommendations we have just given you, it is always important to follow some security guidelines in the use of our devices, such as:<\/p>\n<p>1-. Mant\u00e9n actualizado tu dispositivo con los \u00faltimos parches de seguridad y utiliza soluciones de seguridad confiables, como antivirus y antimalware. <\/p>\n<p>2-. Considera el uso de servicios de autenticaci\u00f3n de dos factores (<a href=\"https:\/\/businessadapter.es\/riesgos-de-una-contrasena-debil-y-soluciones-practicas\/\">2FA<\/a>) para proteger tus cuentas en l\u00ednea. Esto proporcionar\u00e1 una capa adicional de seguridad incluso si alguien obtiene acceso a tus contrase\u00f1as.  <\/p>\n<p>3-. Evita conectarte a redes wifi p\u00fablicas. <\/p>\n<p>4-. Activa en tu conexi\u00f3n de internet m\u00f3vil la VPN correspondiente <\/p>\n<p>5-. Cifrar la informaci\u00f3n antes del env\u00edo de la misma, as\u00ed como cifrar de extremo a extremos las conversaciones en la utilizaci\u00f3n de la mensajer\u00eda instant\u00e1nea. <\/p>\n<h3><span style=\"color: #800000;\"><strong>Business Adapter\u00ae at your service  <\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">If you have doubts about how to avoid a possible attack to your devices, or you want to improve the security measures you have implemented, do not hesitate and contact us by email: <a href=\"mailto:info@businessadapter.es,%20\">info@businessadapter.es, <\/a> you can also call <a href=\"http:\/\/tel.961318804\">96 131 88 04<\/a>, or leave your message in this form:<\/p>\n<p> <\/p>\n<p><strong>[su_button url=&#8221;https:\/\/businessadapter.es\/contacto&#8221; target=&#8221;blank&#8221; background=&#8221;#f6f903&#8243; color=&#8221;#181818&#8243; size=&#8221;7&#8243; center=&#8221;yes&#8221; icon_color=&#8221;#000000&#8243;]Contact us, we will be pleased to help you.[\/su_button]<\/strong><\/p>\n<p> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>On vacation, be careful where you charge your cell phone Normally, we are cautious about leaving home with our devices [&hellip;]<\/p>\n","protected":false},"author":1373,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[75],"tags":[88,96,83],"class_list":["post-16508","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cybersecurity","tag-security-breach","tag-security-measures"],"_links":{"self":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/users\/1373"}],"replies":[{"embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/comments?post=16508"}],"version-history":[{"count":1,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16508\/revisions"}],"predecessor-version":[{"id":16510,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16508\/revisions\/16510"}],"wp:attachment":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/media?parent=16508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/categories?post=16508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/tags?post=16508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}