Lockdown mode in Android 15 protects your phone from ‘juice jacking’

Affiliate links on Android Authority may earn us a commission. Learn more.

MOBILEANDROID OS

Lockdown mode in Android 15 protects your phone from ‘juice jacking’

These covert attacks could soon be a thing of the past.

By Mishaal Rahman

9 hours ago

Mishaal Rahman / Android Authority

TL;DR

Android 15 is adding a built-in mechanism to protect your device from “juice jacking” attacks.

Charging will be allowed when lockdown mode is enabled in Android 15, but USB data access will not.

Juice jacking is a largely theoretical problem you don’t really need to worry about, but it’s still nice that Android will protect you against it.

You may have heard of a problem called “juice jacking” recently. It’s a hacking method that involves secretly sending data payloads from a USB cable that you think is only charging your device. These data payloads can theoretically compromise your device or cause it to take some action unbeknownst to you. However, in reality, the threat of juice jacking is so minimal to almost be ignorable, but if you’re still wary of public charging stations, Android 15 has you covered.

Juice jacking takes advantage of the fact that most devices don’t block USB data signaling, i.e., data being transferred over USB, by default. That means that, while on the surface, a USB cable you plug your phone into might seem innocuous, in reality it might be attempting to send some payload to commandeer your device.

Chart: How Much Money Is Lost to Cybercrime? | Statista

According to the Bureau’s analysis, losses connected to cybercrime complaints were $12.5 billion in 2023,

Hackers Using OTP bots To Bypass Two-Factor Authentication

After acquiring victim credentials, the scammer sets up a call by selecting an impersonation category (bank, email service, etc.) and manually entering the specific organization name, victim’s name, and phone number. 

Massachusetts town loses $445,000 in email scam | StateScoop

According to his statement, town employees in September received legitimate emails from the vendor to discuss issues processing payments. But, unbeknownst to the town, the cybercriminals had compromised some town employee user accounts and were monitoring email correspondence.

New Warmcookie Windows backdoor pushed via fake job offers

Warmcookie is capable of extensive machine fingerprinting, screenshot capturing, and the deployment of additional payloads.

Rural hospitals keep getting attacked by cybercriminals. Microsoft and Google are working to fix that | CNN Business

The nation’s roughly 1,800 rural community hospitals are among the most vulnerable to dangerous ransomware attacks because they often lack IT security resources and cybersecurity-trained staff.

An evolving threat landscape: A battle between good and evil | TechRadar

As these criminal enterprises grow more professional, they also scale their operations, launching diverse and sophisticated attacks across the globe.

8 Best PuTTY Alternatives for SSH Client Connections

PuTTY is just like the translator that bridges the information gap. This software is a handy tool when it comes to establishing an SSH client connection path, which is eventually necessary for file transfers and system management.

Disney’s biggest cybersecurity threat could be…Club Penguin fans? | TechRadar

The feud between Disney and the fans of its defunct Club Penguin game has taken an unexpected security-focused turn after a seemingly fresh database full of sensitive company information was leaked online.

Windows Feature That Records Everything You Do Can Easily Be Hacked

Worse yet, as Wired reports, Microsoft has essentially admitted that it won’t hide passwords or other highly sensitive information — and researchers have already found easy ways to recover this data.