Even with advanced solutions and sophisticated protocols in place, employees continue to inadvertently expose sensitive data and systems to cyber threats.
Tag: #vulnerability
Lockdown mode in Android 15 protects your phone from ‘juice jacking’
Affiliate links on Android Authority may earn us a commission. Learn more.
MOBILEANDROID OS
Lockdown mode in Android 15 protects your phone from ‘juice jacking’
These covert attacks could soon be a thing of the past.
By Mishaal Rahman
•
9 hours ago

Mishaal Rahman / Android Authority
TL;DR
Android 15 is adding a built-in mechanism to protect your device from “juice jacking” attacks.
Charging will be allowed when lockdown mode is enabled in Android 15, but USB data access will not.
Juice jacking is a largely theoretical problem you don’t really need to worry about, but it’s still nice that Android will protect you against it.
You may have heard of a problem called “juice jacking” recently. It’s a hacking method that involves secretly sending data payloads from a USB cable that you think is only charging your device. These data payloads can theoretically compromise your device or cause it to take some action unbeknownst to you. However, in reality, the threat of juice jacking is so minimal to almost be ignorable, but if you’re still wary of public charging stations, Android 15 has you covered.
Juice jacking takes advantage of the fact that most devices don’t block USB data signaling, i.e., data being transferred over USB, by default. That means that, while on the surface, a USB cable you plug your phone into might seem innocuous, in reality it might be attempting to send some payload to commandeer your device.
Massachusetts town loses $445,000 in email scam | StateScoop
According to his statement, town employees in September received legitimate emails from the vendor to discuss issues processing payments. But, unbeknownst to the town, the cybercriminals had compromised some town employee user accounts and were monitoring email correspondence.
Rural hospitals keep getting attacked by cybercriminals. Microsoft and Google are working to fix that | CNN Business
The nation’s roughly 1,800 rural community hospitals are among the most vulnerable to dangerous ransomware attacks because they often lack IT security resources and cybersecurity-trained staff.
8 Best PuTTY Alternatives for SSH Client Connections
PuTTY is just like the translator that bridges the information gap. This software is a handy tool when it comes to establishing an SSH client connection path, which is eventually necessary for file transfers and system management.
Malicious VSCode extensions with millions of installs discovered
Visual Studio Code (VSCode) is a source code editor published by Microsoft and used by many professional software developers worldwide.
Crooks plant backdoor in software used by courtrooms around the world | Ars Technica
A software maker serving more than 10,000 courtrooms throughout the world hosted an application update containing a hidden backdoor that maintained persistent communication with a malicious website, researchers reported Thursday, in the latest episode of a supply-chain attack