Science and Tech

What is the ‘USB condom’ and why should it be used to protect devices against malware infections?

15 Apr. (Portaltic/EP) –

One of the ways to introduce infections into technological devices is through the data transfer via USB portssince they offer direct access to the device and make it possible to include ‘malware’ or another type of virus, through a technique known as ‘Juice Jacking’, can be easily avoided by using a ‘USB condom’.

The daily and continuous use of mobile devices such as ‘smartphones’ or tablets makes it, in certain situations, necessary to recharge your battery from anywhere to continue to have access to these tools.

Therefore, in order to meet this demand, public establishments like hotels, coffee shopsshopping malls or even airports and public transport, increasingly put more public charging stations available to users. These charging ports usually offer a power socket with a USB input and, in order to charge the device, the user only has to connect it with a cable of the same type.

However, the Malicious actors take advantage of this practice to spread ‘malware’ and viruses, since the connection to USB ports, in addition to offering charging for the device, also allows the flow of data between the ‘smartphone’ and the charging point.

Specifically, it is the ‘Juice Jacking’ technique, with which cybercriminals tamper with these public charging ports and use them as a data transfer connection to infect the terminal implementing ‘malware’ or even executing the theft of sensitive data.

In this sense, in order to avoid giving free access to malicious actors, either by introducing viruses or monitoring ‘software’, a method effective is the use of a ‘USB condom’. Basically it is a small device whose function is to provide extra layer of protection between the ‘smartphone’ and the public charger.

This device is an adapter that serves as a bridge between the ‘smartphone’ or tablet and the USB port, turning the latter into a charging port only and avoiding data sharing automatically.

The operation of ‘USB condoms’ is simple. The usb connection mainly uses four wires, two of them have the function of energy transfer, that is, they are responsible for the load. The other two are used for data transfer, so they are responsible for transferring files of all kinds, including malware.

Taking this into account, the ‘USB condoms’ only have to block the two connections in charge of data transfer to avoid transfers and only ensure the charge of the ‘smartphone’, tablet or computer.

These devices are useful for any terminal since they are offered with a wide variety of connection typesboth USB A, B and C, as well as Mini-USB or Micro-USB.

One of their advantages is that, due to their size, they are a comfortable tool that can be easily transported, without involving a bulky addition. Another aspect to appreciate is that many of these ‘USB condoms’ also include the option to charge the device at a higher speed. However, what is most striking is its price which, depending on the brand, can be buy for about 10 euros.

However, there are other ways to avoid taking risks of infection when using public charging stations. One of them is to use a portable battery for mobile devices to turn to anytime, anywhere.

Similarly, in the case of ‘smartphones’ I also know can configure so that, once connected, only accept load and data transfer is automatically blocked. However, this last option does not definitively close the doors to possible infections.

Contrary to what it may seem, this practice is common among cybercriminals. Even the FBI has warned about ‘Juice Jacking’, advising users to avoid using these stations free charging in public places and use whenever possible a regular power outlet with your own charger and cable.

In addition to all this, it must be taken into account that the malware infections and viruses will transmitted from device to deviceso if you connect a ‘smartphone’ to a trusted computer, also can get infected if this computer has a virus. That is why ‘USB condoms’ are a necessary protection method that should be used more on a day-to-day basis.

Source link