Prøve GULL - Gratis
Think That USB Port's JUST FOR CHARGING? Think Again.
Electronics For You
|October 2025
Low battery. No outlet. That public USB port looks like a lifeline-but it could be a hacker's keyboard in disguise. Enter choicejacking-a next-generation cyberattack that hijacks our phone without permission. No taps. No clues. Just stolen access. If we care about our data, we must not plug in until we know what that charger is really doing.
Ever used a public charging station at an airport, coffee shop, or hotel? We have all been there—low battery, no outlet in sight, and that USB port seems like a lifeline. But what if that innocent-looking charger could hijack our phone—in less time than it takes to blink?
Welcome to the world of choicejacking—a stealthy, next-generation cyberattack that has security researchers sounding alarms. Unlike old-school juice jacking that required us to click something or fall for a fake app, choicejacking needs nothing from us at all. That is what makes it so dangerous. Let us unpack what it is, how it works, and why—if we care about our data—we should never trust a public USB port again.
What exactly is choicejacking
Let us start with a scenario. We plug our phone into a free USB port to charge. Normally, a prompt appears: “Allow this device to access your data?” We tap No and remain safe. With choicejacking, that prompt flashes for a microsecond—and the charger has already tapped Yes. Silent access in under 133 milliseconds—faster than our eyes can blink.
Choicejacking is the latest evolution in USB-based cyberattacks, discovered by a team of researchers from Graz University of Technology in Austria. Unlike earlier attacks that required malware or questionable apps, this one spoofs our own inputs—sending fake touch or keyboard commands to trick our phone into thinking we gave permission. The charger pretends to be us. This new kind of cyberattack exploits human interface device (HID) emulation—the same USB protocols we use daily to test hardware or connect peripherals are being turned against us.
Under the hood: How the attack works
When we plug into a malicious charger, we are not just drawing power. That charger can double up as:
• A USB host
• A spoofed keyboard or touchscreen (HID)
• A seemingly harmless power source
Denne historien er fra October 2025-utgaven av Electronics For You.
Abonner på Magzter GOLD for å få tilgang til tusenvis av kuraterte premiumhistorier og over 9000 magasiner og aviser.
Allerede abonnent? Logg på
FLERE HISTORIER FRA Electronics For You
Electronics For You
MAGNETIC SIGNALS You Couldn't Hear—Until Now
What if we could sense the invisible? With next-gen TMR sensors hitting picoTesla sensitivity, healthcare, wearables, and even quantum tech are about to change forever.
6 mins
November 2025
Electronics For You
SMALLEST PORTABLE GAME BOY And Wi-Fi Hacking Device
In the late 1980s and 1990s, the Game Boy redefined handheld entertainment.
5 mins
November 2025
Electronics For You
BULLETPROOFING YOUR PRODUCT DESIGN For Wireless Products
In wireless product development, how do you select the right communication technologies, from identifying the specific hardware and software to delivering the finished product?
9 mins
November 2025
Electronics For You
DUAL-TONE SINGLE BELL For Two Doors
In modern homes, apartments, and offices, multiple entrance doors are common. Traditionally, each door requires a separate doorbell, which increases cost and can confuse residents. Hearing a bell without knowing whether it is the main entrance or the back door is a frequent inconvenience. To address this, a single bell device has been designed for two doors, using a common bell that produces two distinct sound patterns depending on which door's switch is pressed. Fig. 1 shows the device prototype without its transformer.
3 mins
November 2025
Electronics For You
Real-Time TEMPERATURE And HUMIDITY MONITORING SYSTEM Using TFT Display
Real-time environmental monitoring is increasingly important in agriculture, industrial automation, smart homes, and healthcare. The real-time data monitoring system measures and displays ambient temperature and humidity on a TFT display, along with the current time, using an Arduino microcontroller.
3 mins
November 2025
Electronics For You
"THE INSPIRATION BEHIND BONV AERO HAS ALWAYS BEEN TO BRING SMART AERIAL MOBILITY TO INDIA"
How close are we to seeing smart aerial mobility move from science fiction to everyday reality, transforming defence, disaster relief, and high-altitude logistics? At BonV Aero, Gaurav Achha is making that leap a reality through advanced drones built to reshape logistics, defence, and emergency response.
7 mins
November 2025
Electronics For You
Why Design For Manufacturing Is India's Electronics Game-Changer
India's electronics growth story will not be written by assembly alone. Embedding Design for Manufacturing into every stage of product creation is the step that can transform ambition into global competitiveness-and make India a genuine leader in electronics.
8 mins
November 2025
Electronics For You
"It's Not About How Many Companies You Incubate— It's About How Many Are Still Standing Five Years Later."
Is IIT-M’s Pravartak just another incubator for startups? Or is it different? To answer that, EFY’s Akanksha spoke to Shankar Raman from Pravartak, and here is what she discovered...
5 mins
November 2025
Electronics For You
AI Vision ASSISTANT CAMERA
The AI vision assistant camera is a smart device for image recognition and interpreta- tion.
4 mins
November 2025
Electronics For You
Compact AI HEALTH MONITORING And ANOMALY DETECTION DEVICE
Early detection of health irregularities helps identify conditions before they develop, allowing timely intervention. Continuous monitoring, however, is not easy without wearable sensors that automatically track health data.
3 mins
November 2025
Listen
Translate
Change font size

