Which of the following statements best describes the term ‘juice...
Recently, the Reserve Bank of India (RBI) has issued a cautionary message to mobile phone users about juice jacking.
- The term “juice jacking” was first coined in 2011 by investigative journalist Brian Krebs.
- It is a form of cyberattack where a public USB charging port is tampered with and infected using hardware and software changes to steal data or install malware on devices connected to it.
- The attack is used by hackers to steal users’ passwords, credit card information, addresses, and other sensitive data stored on the targeted device.
- This type of attack has been a growing concern, with incidents reported in various public spaces such as airports, hotels, and shopping centres.
- RBI emphasised the importance of protecting personal and financial data while using mobile devices.
- How to prevent such attacks?
- To protect themselves from juice jacking and other cyber threats, mobile phone users have to use their personal chargers and avoid connecting their devices to public USB ports.
- Additionally, using a Virtual Private Network (VPN) and ensuring that devices have the latest security updates installed can help mitigate the risk of cyberattacks.
Hence option (a) is the correct answer.
Which of the following statements best describes the term ‘juice...
Explanation:
b) Juice Jacking
Juice jacking refers to a form of cyber attack that involves tampering with public USB charging ports. When individuals use these compromised charging ports to charge their devices, they unknowingly expose their data to potential theft or malware installation. Hackers can modify the USB ports to steal sensitive information such as passwords, personal data, and banking details from connected devices.
How does juice jacking work?
- Hackers can install malicious software onto the public charging ports, which can then transfer data from connected devices.
- Once a device is plugged in, the malware can access and steal data from the device without the user's knowledge.
- This type of attack can occur in places like airports, hotels, and other public spaces where individuals may need to charge their devices.
Preventive measures
- To protect against juice jacking, it is recommended to avoid using public charging ports and instead opt for a wall charger or portable power bank.
- Using a data blocker or a charge-only USB cable can also help prevent data theft when charging in public places.
- Regularly updating device software and using security measures like password protection and encryption can further enhance security against such attacks.
By being aware of the risks associated with juice jacking and taking necessary precautions, individuals can safeguard their personal data and prevent falling victim to cyber attacks.
To make sure you are not studying endlessly, EduRev has designed UPSC study material, with Structured Courses, Videos, & Test Series. Plus get personalized analysis, doubt solving and improvement plans to achieve a great score in UPSC.