SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
JUICE
JACKING
SWIPE LEFT
@infosectrain
JUICE
JACKING SWIPE LEFT
@infosectrain
JUICE
www.infosectrain.com
Hi Joe, Why do you look
so confused?
Hey Jude, My phone
battery has been
draining quickly
JOE:
What have you done to your phone?
Where did you go yesterday?
Yesterday, my phone was switched
off, so I connected with
the charging port at a
nearby metro station
JOE:
www.infosectrain.com
Oh God! your phone has been infected
with a Juice Jacking Attack.
Juice Jacking Attack?
What is it?
JOE:
www.infosectrain.com
Juice Jacking Attack is a kind of cyber
attack originating from the USB port
installed in public places. Attackers
sometimes tamper with the USB ports
to access your data for exploitation
Oh no!
JOE:
www.infosectrain.com
Beware before you plug your phone into a USB port.
USB ports can transfer or sync your data, leading to
data exploitation.
www.infosectrain.com
SECURE YOUR DATA
THANK YOU

Mais conteúdo relacionado

Mais procurados

Credit creation process
Credit creation processCredit creation process
Credit creation process
Namrata More
 
Non resident indian (nri)bala
Non resident indian (nri)balaNon resident indian (nri)bala
Non resident indian (nri)bala
Ameer Nivas
 
Money Laundering by Vivek Singh,Aryan College
Money Laundering  by Vivek Singh,Aryan CollegeMoney Laundering  by Vivek Singh,Aryan College
Money Laundering by Vivek Singh,Aryan College
Aryan Ajmer
 

Mais procurados (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Arduino Introduction (Blinking LED) Presentation (workshop #5)
Arduino  Introduction (Blinking LED)  Presentation (workshop #5)Arduino  Introduction (Blinking LED)  Presentation (workshop #5)
Arduino Introduction (Blinking LED) Presentation (workshop #5)
 
International Banking - Principles and Practices of Banking
International Banking - Principles and Practices of BankingInternational Banking - Principles and Practices of Banking
International Banking - Principles and Practices of Banking
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Banking and Financial Service Unit 1
Banking and Financial Service Unit 1Banking and Financial Service Unit 1
Banking and Financial Service Unit 1
 
Credit creation process
Credit creation processCredit creation process
Credit creation process
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Non resident indian (nri)bala
Non resident indian (nri)balaNon resident indian (nri)bala
Non resident indian (nri)bala
 
Money Laundering by Vivek Singh,Aryan College
Money Laundering  by Vivek Singh,Aryan CollegeMoney Laundering  by Vivek Singh,Aryan College
Money Laundering by Vivek Singh,Aryan College
 
Lesson 12 deductions
Lesson 12 deductionsLesson 12 deductions
Lesson 12 deductions
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Fraud forgery and scams powerpoint
Fraud forgery and scams powerpointFraud forgery and scams powerpoint
Fraud forgery and scams powerpoint
 
Indian banking system
Indian banking systemIndian banking system
Indian banking system
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Functions of commercial banks
Functions of commercial banksFunctions of commercial banks
Functions of commercial banks
 
Debit And Credit Cards
Debit And Credit CardsDebit And Credit Cards
Debit And Credit Cards
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 

Mais de infosec train

Everything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTrainEverything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTrain
infosec train
 

Mais de infosec train (20)

Azure Administrator and Security Training.pdf
Azure Administrator and Security Training.pdfAzure Administrator and Security Training.pdf
Azure Administrator and Security Training.pdf
 
SOC Specailist Training.pdf InfosecTrain
SOC Specailist Training.pdf InfosecTrainSOC Specailist Training.pdf InfosecTrain
SOC Specailist Training.pdf InfosecTrain
 
CISSP Domain 1: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭.pdf
CISSP Domain 1: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭.pdfCISSP Domain 1: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭.pdf
CISSP Domain 1: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭.pdf
 
CRISC Domains Mind Map InfosecTrain .pdf
CRISC Domains Mind Map InfosecTrain .pdfCRISC Domains Mind Map InfosecTrain .pdf
CRISC Domains Mind Map InfosecTrain .pdf
 
Everything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTrainEverything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTrain
 
Top 10 Cyber Attacks 2024.pdf InfosecTrain
Top 10 Cyber Attacks 2024.pdf InfosecTrainTop 10 Cyber Attacks 2024.pdf InfosecTrain
Top 10 Cyber Attacks 2024.pdf InfosecTrain
 
Cloud Storage vs. Local Storage.pdf InfosecTrain
Cloud Storage vs. Local Storage.pdf InfosecTrainCloud Storage vs. Local Storage.pdf InfosecTrain
Cloud Storage vs. Local Storage.pdf InfosecTrain
 
Threat- Hunting-Tips .pdf InfosecTrain
Threat- Hunting-Tips  .pdf  InfosecTrainThreat- Hunting-Tips  .pdf  InfosecTrain
Threat- Hunting-Tips .pdf InfosecTrain
 
AXIS Bank Credit Card Fraud.pdf infosectrain
AXIS Bank Credit Card Fraud.pdf infosectrainAXIS Bank Credit Card Fraud.pdf infosectrain
AXIS Bank Credit Card Fraud.pdf infosectrain
 
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdfInterpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
 
Cybersecurity Expert Training InfosecTrain.pdf
Cybersecurity Expert Training InfosecTrain.pdfCybersecurity Expert Training InfosecTrain.pdf
Cybersecurity Expert Training InfosecTrain.pdf
 
𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐂𝐡𝐚𝐥𝐥𝐞𝐧𝐠𝐞𝐬 & 𝐒𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐬!.pdf
𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐂𝐡𝐚𝐥𝐥𝐞𝐧𝐠𝐞𝐬 & 𝐒𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐬!.pdf𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐂𝐡𝐚𝐥𝐥𝐞𝐧𝐠𝐞𝐬 & 𝐒𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐬!.pdf
𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐂𝐡𝐚𝐥𝐥𝐞𝐧𝐠𝐞𝐬 & 𝐒𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐬!.pdf
 
CEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfCEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdf
 
GRC Online Training by InfosecTrain.pdf
GRC Online Training by  InfosecTrain.pdfGRC Online Training by  InfosecTrain.pdf
GRC Online Training by InfosecTrain.pdf
 
PMP Certification Training Course.pdf
PMP Certification Training    Course.pdfPMP Certification Training    Course.pdf
PMP Certification Training Course.pdf
 
upcoming batches of InfosecTrain .pdf 01
upcoming batches of InfosecTrain .pdf 01upcoming batches of InfosecTrain .pdf 01
upcoming batches of InfosecTrain .pdf 01
 
Best SOC Career Guide InfosecTrain .pdf
Best SOC Career Guide  InfosecTrain .pdfBest SOC Career Guide  InfosecTrain .pdf
Best SOC Career Guide InfosecTrain .pdf
 
NIST CHECKLIST by InfosecTrain.pdf InfosecTrain
NIST CHECKLIST by InfosecTrain.pdf InfosecTrainNIST CHECKLIST by InfosecTrain.pdf InfosecTrain
NIST CHECKLIST by InfosecTrain.pdf InfosecTrain
 
PCI-DSS(Payment Card Industry Data Security Standard) Training .pdf
PCI-DSS(Payment Card Industry Data Security Standard) Training .pdfPCI-DSS(Payment Card Industry Data Security Standard) Training .pdf
PCI-DSS(Payment Card Industry Data Security Standard) Training .pdf
 
Types of Data Privacy by InfosecTrain.pdf
Types of Data Privacy by InfosecTrain.pdfTypes of Data Privacy by InfosecTrain.pdf
Types of Data Privacy by InfosecTrain.pdf
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

Juice Jacking

  • 2. www.infosectrain.com Hi Joe, Why do you look so confused? Hey Jude, My phone battery has been draining quickly JOE:
  • 3. What have you done to your phone? Where did you go yesterday? Yesterday, my phone was switched off, so I connected with the charging port at a nearby metro station JOE: www.infosectrain.com
  • 4. Oh God! your phone has been infected with a Juice Jacking Attack. Juice Jacking Attack? What is it? JOE: www.infosectrain.com
  • 5. Juice Jacking Attack is a kind of cyber attack originating from the USB port installed in public places. Attackers sometimes tamper with the USB ports to access your data for exploitation Oh no! JOE: www.infosectrain.com
  • 6. Beware before you plug your phone into a USB port. USB ports can transfer or sync your data, leading to data exploitation. www.infosectrain.com