Juice Jacking - What it is, why public USB is risky, and how to charge safely

Juice Jacking

What it is

Juice jacking is when a public USB charging port is used to steal data or install malware on your phone or tablet. The same cable that carries power can carry data - a tampered port or cable abuses that to poke your device.

How it works - quick tour

  • A malicious kiosk or cable offers power but also exposes a data connection.

  • Your device trusts the port and may mount storage or accept commands.

  • Attackers can grab files, scrape tokens, or drop spyware in seconds.

What you may notice

  • A prompt asking to trust this computer when you only wanted to charge

  • File transfer mode turning on by itself

  • Odd behavior after charging - new profiles, rapid battery drain, unknown apps

Prevent it

  • Use your own wall charger or a USB data-blocker (charge-only adapter).

  • Carry a power bank for airports, hotels, and conferences.

  • If you must use public USB, deny trust prompts and keep the screen locked.

  • On Android, set default USB to Charge only. On iOS, enable Lockdown Mode if appropriate and keep the device locked while charging.

  • Keep your OS updated and avoid sideloading from unknown sources.

If you already plugged in

  1. Unplug immediately if a trust prompt appears.

  2. Reboot your device and run a mobile security scan.

  3. Review installed apps, device admin, accessibility, VPN, and MDM profiles - remove anything unknown.

  4. Change passwords from a clean device and revoke suspicious sessions.

  5. Watch accounts for unusual logins or 2FA prompts.

    Glossary (A–Z)

    All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
      • Related Articles

      • Mobile Malware

        What it is Mobile malware is malicious software that targets phones and tablets. It can steal messages and passwords, spy through permissions, hijack your browser, or lock files for ransom. Infections usually arrive through shady apps, smishing ...
      • Mobile Code

        What it is Mobile code is code that arrives with a page, message, or app and runs automatically on your device. Think scripts, macros, plug-ins, and mini apps that add features like forms, animations, or in-app widgets. When misused, the same ...
      • Data Execution Prevention

        What it is Data Execution Prevention (DEP) is a Windows safety net that stops code from running in places it shouldn’t—like the stack or heap. If malware tries to execute from those memory areas, Windows blocks it and shuts the app down instead of ...
      • Data Breach Prevention

        Why it matters Breaches drain money, trust, and time. Strong basics turn scary “what ifs” into non-events: a phish gets ignored, a stolen password is useless, a lost laptop holds only encrypted gibberish. The short, smart checklist MFA everywhere: ...
      • Madware

        What it is Madware is aggressive mobile advertising. It stuffs your phone or tablet with pop-ups, full-screen ads, notification spam, and sneaky redirects. While not always outright malware, it invades privacy, slows performance, and can open the ...