The FBI has warned against the use of public charging points for electronic devices, saying they can be a gateway for cyber criminals.
Public charging stations heightens the risk of bad actors installing malware and gaining access to devices, the top US law enforcement agency's Denver department said on Twitter.
“Avoid using free charging stations in airports, hotels or shopping centres. Bad actors have figured out ways to use public USB ports to introduce malware and monitoring software on to devices,” the FBI said.
“Carry your own charger and USB cord and use an electrical outlet instead.”
Charging stations have become ubiquitous in public spaces, including malls, hotels, restaurants and parks, providing users a convenient way to power up their devices.
However, the practice has paved the way for what is called “juice jacking”, which simply means using a USB connection to compromise a device.
Aside from bringing personal charging equipment, it is also advised to plan ahead and charge devices before stepping out to prevent any cyber risk that may result from using public charging points.
WHAT%20IS%20'JUICE%20JACKING'%3F
%3Cp%3E%E2%80%A2%20Juice%20jacking%2C%20in%20the%20simplest%20terms%2C%20is%20using%20a%20rogue%20USB%20cable%20to%20access%20a%20device%20and%20compromise%20its%20contents%3C%2Fp%3E%0A%3Cp%3E%E2%80%A2%20The%20exploit%20is%20taken%20advantage%20of%20by%20the%20fact%20that%20the%20data%20stream%20and%20power%20supply%20pass%20through%20the%20same%20cable.%20The%20most%20common%20example%20is%20connecting%20a%20smartphone%20to%20a%20PC%20to%20both%20transfer%20data%20and%20charge%20the%20former%20at%20the%20same%20time%3C%2Fp%3E%0A%3Cp%3E%E2%80%A2%20The%20term%20was%20first%20coined%20in%202011%20after%20researchers%20created%20a%20compromised%20charging%20kiosk%20to%20bring%20awareness%20to%20the%20exploit%3B%20when%20users%20plugged%20in%20their%20devices%2C%20they%20received%20a%20security%20warning%20and%20discovered%20that%20their%20phones%20had%20paired%20to%20the%20kiosk%2C%20according%20to%20US%20cybersecurity%20company%20Norton%3C%2Fp%3E%0A%3Cp%3E%E2%80%A2%20While%20juice%20jacking%20is%20a%20real%20threat%2C%20there%20have%20been%20no%20known%20widespread%20instances.%20Apple%20and%20Google%20have%20also%20added%20security%20layers%20to%20prevent%20this%20on%20the%20iOS%20and%20Android%20devices%2C%20respectively%3C%2Fp%3E%0A
Malware — a programme typically designed to disrupt or gain unauthorised access into a system — constitutes one of the biggest threats in the IT industry.
It is part of the wider cyber crime sector projected to cause global financial damage of about $10.5 trillion by 2025, according to data from Cybersecurity Ventures.
Globally, about 5.5 billion malware attacks took place in 2022, an increase of 2 per cent from 2021 and nearly half the 10.5 billion peak recorded in 2018, data from Statista shows.
Cyber attacks can cause reputational and financial damage to users. The global average cost for a data breach in 2022 was $4.35 million, up from $4.24 million the previous year, according to the latest edition of IBM's Cost of a Data Breach report.
The FBI has similar guidance on its website, covering a variety of topics on internet safety, including warning against conducting sensitive transactions on a public Wi-Fi network.
“Every day tasks — opening an email attachment, following a link in a text message, making an online purchase — can open you up to online criminals who want to harm your systems or steal from you,” the FBI said.
“Preventing internet-enabled crimes and cyber intrusions requires each of us to be aware and on guard.”
It is not clear if the FBI warning is prompted by any specific case, but US authorities have warned about “juice jacking” in the past.
Most recently, the Federal Communications Commission also warned that cyber criminals can gain access to online accounts and even sell them in the dark web through “juice jacking”.
“Cyber security experts have warned that criminals can load malware on to public USB charging stations to maliciously access electronic devices while they are being charged,” the FCC said.
“Malware installed through a dirty USB port can lock a device or export personal data and passwords directly to the perpetrator.”
The Los Angeles County District Attorney’s Office in November 2019 had also cautioned travellers about USB charger scams.
CREW
%3Cp%3E%3Cstrong%3EDirector%3A%20%3C%2Fstrong%3ERajesh%20A%20Krishnan%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EStarring%3A%20%3C%2Fstrong%3ETabu%2C%20Kareena%20Kapoor%20Khan%2C%20Kriti%20Sanon%26nbsp%3B%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3ERating%3A%3C%2Fstrong%3E%203.5%2F5%3C%2Fp%3E%0A
MATCH INFO
RB Leipzig 2 (Klostermann 24', Schick 68')
Hertha Berlin 2 (Grujic 9', Piatek 82' pen)
Man of the match Matheus Cunha (Hertha Berlin
UAE currency: the story behind the money in your pockets
SPEC%20SHEET%3A%20APPLE%20IPAD%20PRO%20(12.9%22%2C%202022)
%3Cp%3E%3Cstrong%3EDisplay%3A%3C%2Fstrong%3E%2012.9-inch%20Liquid%20Retina%20XDR%2C%202%2C732%20x%202%2C048%2C%20264ppi%2C%20wide%20colour%2C%20True%20Tone%2C%20ProMotion%2C%201%2C600%20nits%20max%2C%20Apple%20Pencil%20hover%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EChip%3A%3C%2Fstrong%3E%20Apple%20M2%2C%208-core%20CPU%2C%2010-core%20GPU%2C%2016-core%20Neural%20Engine%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EMemory%3A%3C%2Fstrong%3E%20Storage%20%E2%80%93%20128GB%2F256GB%2F512GB%20%2F%201TB%2F2TB%3B%20RAM%20%E2%80%93%208GB%2F16GB%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EPlatform%3A%3C%2Fstrong%3E%20iPadOS%2016%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EMain%20camera%3A%3C%2Fstrong%3E%20Dual%2012MP%20wide%20(f%2F1.8)%20%2B%2010MP%20ultra-wide%20(f%2F2.4)%2C%202x%20optical%2F5x%20digital%2C%20Smart%20HDR%204%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EVideo%3A%3C%2Fstrong%3E%20ProRes%204K%20%40%2030fps%2C%204K%20%40%2024%2F25%2F30%2F60fps%2C%20full%20HD%20%40%2025%2F30%2F60fps%2C%20slo-mo%20%40%20120%2F240fps%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EFront%20camera%3A%3C%2Fstrong%3E%20TrueDepth%2012MP%20ultra-wide%20(f%2F2.4)%2C%202x%2C%20Smart%20HDR%204%2C%20Centre%20Stage%2C%20Portrait%2C%20Animoji%2C%20Memoji%3B%20full%20HD%20%40%2025%2F30%2F60fps%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EAudio%3A%3C%2Fstrong%3E%20Four-speaker%20stereo%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EBiometrics%3A%3C%2Fstrong%3E%20Face%20ID%2C%20Touch%20ID%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EI%2FO%3A%3C%2Fstrong%3E%20USB-C%2C%20smart%20connector%20(for%20folio%2Fkeyboard)%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EBattery%3A%3C%2Fstrong%3E%20Up%20to%2010%20hours%20on%20Wi-Fi%3B%20up%20to%20nine%20hours%20on%20cellular%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EFinish%3A%3C%2Fstrong%3E%20Silver%2C%20space%20grey%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EIn%20the%20box%3A%3C%2Fstrong%3E%20iPad%2C%20USB-C-to-USB-C%20cable%2C%2020-watt%20power%20adapter%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EPrice%3A%3C%2Fstrong%3E%20WiFi%20%E2%80%93%20Dh4%2C599%20(128GB)%20%2F%20Dh4%2C999%20(256GB)%20%2F%20Dh5%2C799%20(512GB)%20%2F%20Dh7%2C399%20(1TB)%20%2F%20Dh8%2C999%20(2TB)%3B%20cellular%20%E2%80%93%20Dh5%2C199%20%2F%20Dh5%2C599%20%2F%20Dh6%2C399%20%2F%20Dh7%2C999%20%2F%20Dh9%2C599%3C%2Fp%3E%0A
Richard Jewell
Director: Clint Eastwood
Stars: Paul Walter Hauser, Sam Rockwell, Brandon Stanley
Two-and-a-half out of five stars
Tips to keep your car cool
- Place a sun reflector in your windshield when not driving
- Park in shaded or covered areas
- Add tint to windows
- Wrap your car to change the exterior colour
- Pick light interiors - choose colours such as beige and cream for seats and dashboard furniture
- Avoid leather interiors as these absorb more heat
New UK refugee system
- A new “core protection” for refugees moving from permanent to a more basic, temporary protection
- Shortened leave to remain - refugees will receive 30 months instead of five years
- A longer path to settlement with no indefinite settled status until a refugee has spent 20 years in Britain
- To encourage refugees to integrate the government will encourage them to out of the core protection route wherever possible.
- Under core protection there will be no automatic right to family reunion
- Refugees will have a reduced right to public funds
The biog
Name: Abeer Al Bah
Born: 1972
Husband: Emirati lawyer Salem Bin Sahoo, since 1992
Children: Soud, born 1993, lawyer; Obaid, born 1994, deceased; four other boys and one girl, three months old
Education: BA in Elementary Education, worked for five years in a Dubai school
Desert Warrior
Starring: Anthony Mackie, Aiysha Hart, Ben Kingsley
Director: Rupert Wyatt
Rating: 3/5
The specs
Engine: 2-litre 4-cylinder and 3.6-litre 6-cylinder
Power: 220 and 280 horsepower
Torque: 350 and 360Nm
Transmission: eight-speed automatic
Price: from Dh136,521 VAT and Dh166,464 VAT
On sale: now
Classification of skills
A worker is categorised as skilled by the MOHRE based on nine levels given in the International Standard Classification of Occupations (ISCO) issued by the International Labour Organisation.
A skilled worker would be someone at a professional level (levels 1 – 5) which includes managers, professionals, technicians and associate professionals, clerical support workers, and service and sales workers.
The worker must also have an attested educational certificate higher than secondary or an equivalent certification, and earn a monthly salary of at least Dh4,000.
SM Town Live is on Friday, April 6 at Autism Rocks Arena, Dubai. Tickets are Dh375 at www.platinumlist.net
HIV on the rise in the region
A 2019 United Nations special analysis on Aids reveals 37 per cent of new HIV infections in the Mena region are from people injecting drugs.
New HIV infections have also risen by 29 per cent in western Europe and Asia, and by 7 per cent in Latin America, but declined elsewhere.
Egypt has shown the highest increase in recorded cases of HIV since 2010, up by 196 per cent.
Access to HIV testing, treatment and care in the region is well below the global average.
Few statistics have been published on the number of cases in the UAE, although a UNAIDS report said 1.5 per cent of the prison population has the virus.
Our family matters legal consultant
Name: Hassan Mohsen Elhais
Position: legal consultant with Al Rowaad Advocates and Legal Consultants.
Islamophobia definition
A widely accepted definition was made by the All Party Parliamentary Group on British Muslims in 2019: “Islamophobia is rooted in racism and is a type of racism that targets expressions of Muslimness or perceived Muslimness.” It further defines it as “inciting hatred or violence against Muslims”.
Tales of Yusuf Tadros
Adel Esmat (translated by Mandy McClure)
Hoopoe
The Vile
Starring: Bdoor Mohammad, Jasem Alkharraz, Iman Tarik, Sarah Taibah
Director: Majid Al Ansari
Rating: 4/5
Scorecard
Scotland 220
K Coetzer 95, J Siddique 3-49, R Mustafa 3-35
UAE 224-3 in 43,5 overs
C Suri 67, B Hameed 63 not out
It Was Just an Accident
Director: Jafar Panahi
Stars: Vahid Mobasseri, Mariam Afshari, Ebrahim Azizi, Hadis Pakbaten, Majid Panahi, Mohamad Ali Elyasmehr
Rating: 4/5
The specs: 2017 Ford F-150 Raptor
Price, base / as tested Dh220,000 / Dh320,000
Engine 3.5L V6
Transmission 10-speed automatic
Power 421hp @ 6,000rpm
Torque 678Nm @ 3,750rpm
Fuel economy, combined 14.1L / 100km
Pakistan squad
Sarfraz (c), Zaman, Imam, Masood, Azam, Malik, Asif, Sohail, Shadab, Nawaz, Ashraf, Hasan, Amir, Junaid, Shinwari and Afridi
The specs: Volvo XC40
Price: base / as tested: Dh185,000
Engine: 2.0-litre, turbocharged in-line four-cylinder
Gearbox: Eight-speed automatic
Power: 250hp @ 5,500rpm
Torque: 350Nm @ 1,500rpm
Fuel economy, combined: 10.4L / 100km
Babumoshai Bandookbaaz
Director: Kushan Nandy
Starring: Nawazuddin Siddiqui, Bidita Bag, Jatin Goswami
Three stars
WHAT%20IS%20'JUICE%20JACKING'%3F
%3Cp%3E%E2%80%A2%20Juice%20jacking%2C%20in%20the%20simplest%20terms%2C%20is%20using%20a%20rogue%20USB%20cable%20to%20access%20a%20device%20and%20compromise%20its%20contents%3C%2Fp%3E%0A%3Cp%3E%E2%80%A2%20The%20exploit%20is%20taken%20advantage%20of%20by%20the%20fact%20that%20the%20data%20stream%20and%20power%20supply%20pass%20through%20the%20same%20cable.%20The%20most%20common%20example%20is%20connecting%20a%20smartphone%20to%20a%20PC%20to%20both%20transfer%20data%20and%20charge%20the%20former%20at%20the%20same%20time%3C%2Fp%3E%0A%3Cp%3E%E2%80%A2%20The%20term%20was%20first%20coined%20in%202011%20after%20researchers%20created%20a%20compromised%20charging%20kiosk%20to%20bring%20awareness%20to%20the%20exploit%3B%20when%20users%20plugged%20in%20their%20devices%2C%20they%20received%20a%20security%20warning%20and%20discovered%20that%20their%20phones%20had%20paired%20to%20the%20kiosk%2C%20according%20to%20US%20cybersecurity%20company%20Norton%3C%2Fp%3E%0A%3Cp%3E%E2%80%A2%20While%20juice%20jacking%20is%20a%20real%20threat%2C%20there%20have%20been%20no%20known%20widespread%20instances.%20Apple%20and%20Google%20have%20also%20added%20security%20layers%20to%20prevent%20this%20on%20the%20iOS%20and%20Android%20devices%2C%20respectively%3C%2Fp%3E%0A