Useful content

Why can not you use someone else's charge for smartphone

click fraud protection

Everyone who has a smart phone, a painfully familiar situation: the battery power is at zero, and the charge was left at home. And in this situation we ask colleagues or fellow travelers charging and do not consider it a bad thing, and the more dangerous. But the modern world of cybernetics is developing rapidly and today (2019, September) specialists Cybersecurity is strongly advised not to use another charge and consider it a huge mistake. Let me explain why.

There is a whole class of things that are downright dangerous to lend to other users. That's what the company believes the head X-Force Red in the IBM Security Ch Henderson.

After all, you do not borrow, such as a toothbrush or underwear, you are buying a new one. Similarly, you need to maintain and with cords on chargers and here's why.

Henderson company specializes in finding vulnerabilities and hacking of computer systems customers. And lately hackers have learned to literally embed malware in the power cords for the charges.

Standing hapless user to use such "contaminated" cord and passwords and personal data will be at risk.

instagram viewer

In August 2019 the annual DEF CON Hacking ConferenceThat it takes place in Las Vegas, The world-famous hacker under the name MG presented on display to modify the cord to charge iPhone.

DEF CON Hacking Conference
DEF CON Hacking Conference

Make connections iPod using this cord MacHe was able to learn the iP address wires and by using this fully gain control over the computer.

The same hacker then completely erased all traces of the virus on the infected computer.

yandex.ru
yandex.ru

Another hacker said that such modified cords he sold like hotcakes at a considerable price of 200 US dollars per lead.

I hasten to reassure you, at the moment (September 2019), this technology is poorly distributed, and if you are the victim of such an attack, you know, it was a deliberate action. And in order to run a virus on this cord is infected, the hacker must be within 80 meters of the breaking facility.

yandex.ru
yandex.ru
yandex.ru

But technological progress is not standing still and develops by leaps and bounds. Already this modification charger cord is relatively cheap, but it is rapidly cheaper and quite realistic that just six months - a year this kind of hacking will gain mass character.

How to protect yourself

To avoid becoming a victim of such attacks should observe basic safety precautions, such as:

Do not offer his own and especially do not take the wrong cords to charge, because if you use this cord in computer, by and large with the cord you pass all your passwords and usernames, and to do it at least stupid.

Note. I understand that all this is related mostly to those who are actively moving and often uses charging stations in public places. But about this type of hacking you have to know everything!

Do not accept "a gift" supposedly cords from various partners about such gifts as unwanted letters and smskam (just throw them).

yandex.ru
yandex.ru

Always carry any with its own charging.

That's all I wanted to tell you about a new kind of hacking - hacking protection via a cord from the charger. If you liked the material, then rate it Like!

The feed tomatoes stages

The feed tomatoes stages

Dressing for tomatoes can be different. It all depends on whether you are a supporter of organic ...

Read More

House for 3 days

House for 3 days

Probably most have seen the movie "Transformers"? This is where robots can be folded-decomposed, ...

Read More

Experiment sharpening drills "Ballerina". Results and conclusions

Experiment sharpening drills "Ballerina". Results and conclusions

Lights... on fiberboard is still normal, but on plywood and wood burning. I'm talking about the b...

Read More

Instagram story viewer