Lockdown mode in Android 15 protects your phone from ‘juice jacking’

Affiliate links on Android Authority may earn us a commission. Learn more.

MOBILEANDROID OS

Lockdown mode in Android 15 protects your phone from ‘juice jacking’

These covert attacks could soon be a thing of the past.

By Mishaal Rahman

9 hours ago

Mishaal Rahman / Android Authority

TL;DR

Android 15 is adding a built-in mechanism to protect your device from “juice jacking” attacks.

Charging will be allowed when lockdown mode is enabled in Android 15, but USB data access will not.

Juice jacking is a largely theoretical problem you don’t really need to worry about, but it’s still nice that Android will protect you against it.

You may have heard of a problem called “juice jacking” recently. It’s a hacking method that involves secretly sending data payloads from a USB cable that you think is only charging your device. These data payloads can theoretically compromise your device or cause it to take some action unbeknownst to you. However, in reality, the threat of juice jacking is so minimal to almost be ignorable, but if you’re still wary of public charging stations, Android 15 has you covered.

Juice jacking takes advantage of the fact that most devices don’t block USB data signaling, i.e., data being transferred over USB, by default. That means that, while on the surface, a USB cable you plug your phone into might seem innocuous, in reality it might be attempting to send some payload to commandeer your device.

Chart: How Much Money Is Lost to Cybercrime? | Statista

According to the Bureau’s analysis, losses connected to cybercrime complaints were $12.5 billion in 2023,

Hackers Using OTP bots To Bypass Two-Factor Authentication

After acquiring victim credentials, the scammer sets up a call by selecting an impersonation category (bank, email service, etc.) and manually entering the specific organization name, victim’s name, and phone number. 

Massachusetts town loses $445,000 in email scam | StateScoop

According to his statement, town employees in September received legitimate emails from the vendor to discuss issues processing payments. But, unbeknownst to the town, the cybercriminals had compromised some town employee user accounts and were monitoring email correspondence.

Rural hospitals keep getting attacked by cybercriminals. Microsoft and Google are working to fix that | CNN Business

The nation’s roughly 1,800 rural community hospitals are among the most vulnerable to dangerous ransomware attacks because they often lack IT security resources and cybersecurity-trained staff.

Checkmate: What Chess Taught Me About Cyber Resilience

However, beginners often make the mistake of using the queen to protect too many other pieces. They fail to maximize their other pieces’ potential by over-relying on a single resource. The same can be said for the workplace. When we over-leverage our strongest performers, it’s impossible to cultivate a well-balanced and coordinated team.

8 Best PuTTY Alternatives for SSH Client Connections

PuTTY is just like the translator that bridges the information gap. This software is a handy tool when it comes to establishing an SSH client connection path, which is eventually necessary for file transfers and system management.

Malicious VSCode extensions with millions of installs discovered

Visual Studio Code (VSCode) is a source code editor published by Microsoft and used by many professional software developers worldwide.

Microsoft is reworking Recall after researchers point out its security problems | Ars Technica

Microsoft has announced that it’s making some substantial changes to Recall ahead of its release on the first wave of Copilot+ PCs later this month.

Disney’s biggest cybersecurity threat could be…Club Penguin fans? | TechRadar

The feud between Disney and the fans of its defunct Club Penguin game has taken an unexpected security-focused turn after a seemingly fresh database full of sensitive company information was leaked online.