Do Not Fleck Open Cell Phones to Avoid Cyber Piracy

Information Technology Observer reminds not to charge or charge mobile phones and other devices in any place to prevent cyber piracy.

IPHEDIA.com - Cyber ​​piracy continues to grow with the changing times. In the past, piracy had to be done through internet services. But at this time, this can be done through a cell phone rechargeable battery.

Public places that look safe can be a risk of piracy. Public places, such as airports, stations, rest areas, restaurants and others can potentially be hacking places.

Information Technology Observer reminds not to charge or charge mobile phones and other devices in any place to prevent cyber piracy.

The latest hacking technique known as "juice jacking" is a new threat. Because the technique is able to hack gadgets via the USB data cable that is commonly used to recharge.

Use the same cable, a way for hackers to enter and get access to mobile phones during the charging process. Hackers use data cables to access phone data or inject malicious code into devices.

Data theft with this method poses the greatest threat to mobile devices every time a battery is recharged. Therefore, for those who are running out of battery on the road, be careful every time you want to recharge or charge your cellphone or gadget that you carry.

It is recommended for users to get used to charging phone batteries at home and office, carrying a power backup device or "power bank", avoiding recharging in public places, just recharging using your own data cable.

To avoid cyber piracy, the cellphone owner must lock the phone. Because, if the phone is locked it cannot be accessed. However, keep in mind that hacking takes place in seconds. So, make sure the cellphone must be completely locked. (as/ip)

Buka Komentar
Tutup Komentar
No comments:
Write comment

Siapapun boleh berkomentar, tetapi dengan cara yang bijaksana dan bertanggung jawab. Komentar sepenuhnya menjadi tanggung jawab individu komentator seperti yang diatur dalam UU ITE (Undang-Undang Informasi dan Transaksi Elektronik).

TOPIK

Back to Top