Gå ubegrenset med Magzter GOLD

Gå ubegrenset med Magzter GOLD

Få ubegrenset tilgang til over 9000 magasiner, aviser og premiumhistorier for bare

$149.99
 
$74.99/År

Prøve GULL - Gratis

Think That USB Port's JUST FOR CHARGING? Think Again.

Electronics For You

|

October 2025

Low battery. No outlet. That public USB port looks like a lifeline-but it could be a hacker's keyboard in disguise. Enter choicejacking-a next-generation cyberattack that hijacks our phone without permission. No taps. No clues. Just stolen access. If we care about our data, we must not plug in until we know what that charger is really doing.

- AKANKSHA SONDHI GAUR

Think That USB Port's JUST FOR CHARGING? Think Again.

Ever used a public charging station at an airport, coffee shop, or hotel? We have all been there—low battery, no outlet in sight, and that USB port seems like a lifeline. But what if that innocent-looking charger could hijack our phone—in less time than it takes to blink?

Welcome to the world of choicejacking—a stealthy, next-generation cyberattack that has security researchers sounding alarms. Unlike old-school juice jacking that required us to click something or fall for a fake app, choicejacking needs nothing from us at all. That is what makes it so dangerous. Let us unpack what it is, how it works, and why—if we care about our data—we should never trust a public USB port again.

What exactly is choicejacking

Let us start with a scenario. We plug our phone into a free USB port to charge. Normally, a prompt appears: “Allow this device to access your data?” We tap No and remain safe. With choicejacking, that prompt flashes for a microsecond—and the charger has already tapped Yes. Silent access in under 133 milliseconds—faster than our eyes can blink.

Choicejacking is the latest evolution in USB-based cyberattacks, discovered by a team of researchers from Graz University of Technology in Austria. Unlike earlier attacks that required malware or questionable apps, this one spoofs our own inputs—sending fake touch or keyboard commands to trick our phone into thinking we gave permission. The charger pretends to be us. This new kind of cyberattack exploits human interface device (HID) emulation—the same USB protocols we use daily to test hardware or connect peripherals are being turned against us.

Under the hood: How the attack works

When we plug into a malicious charger, we are not just drawing power. That charger can double up as:

• A USB host

• A spoofed keyboard or touchscreen (HID)

• A seemingly harmless power source

FLERE HISTORIER FRA Electronics For You

Electronics For You

Electronics For You

MAGNETIC SIGNALS You Couldn't Hear—Until Now

What if we could sense the invisible? With next-gen TMR sensors hitting picoTesla sensitivity, healthcare, wearables, and even quantum tech are about to change forever.

time to read

6 mins

November 2025

Electronics For You

Electronics For You

SMALLEST PORTABLE GAME BOY And Wi-Fi Hacking Device

In the late 1980s and 1990s, the Game Boy redefined handheld entertainment.

time to read

5 mins

November 2025

Electronics For You

BULLETPROOFING YOUR PRODUCT DESIGN For Wireless Products

In wireless product development, how do you select the right communication technologies, from identifying the specific hardware and software to delivering the finished product?

time to read

9 mins

November 2025

Electronics For You

DUAL-TONE SINGLE BELL For Two Doors

In modern homes, apartments, and offices, multiple entrance doors are common. Traditionally, each door requires a separate doorbell, which increases cost and can confuse residents. Hearing a bell without knowing whether it is the main entrance or the back door is a frequent inconvenience. To address this, a single bell device has been designed for two doors, using a common bell that produces two distinct sound patterns depending on which door's switch is pressed. Fig. 1 shows the device prototype without its transformer.

time to read

3 mins

November 2025

Electronics For You

Electronics For You

Real-Time TEMPERATURE And HUMIDITY MONITORING SYSTEM Using TFT Display

Real-time environmental monitoring is increasingly important in agriculture, industrial automation, smart homes, and healthcare. The real-time data monitoring system measures and displays ambient temperature and humidity on a TFT display, along with the current time, using an Arduino microcontroller.

time to read

3 mins

November 2025

Electronics For You

Electronics For You

"THE INSPIRATION BEHIND BONV AERO HAS ALWAYS BEEN TO BRING SMART AERIAL MOBILITY TO INDIA"

How close are we to seeing smart aerial mobility move from science fiction to everyday reality, transforming defence, disaster relief, and high-altitude logistics? At BonV Aero, Gaurav Achha is making that leap a reality through advanced drones built to reshape logistics, defence, and emergency response.

time to read

7 mins

November 2025

Electronics For You

Electronics For You

Why Design For Manufacturing Is India's Electronics Game-Changer

India's electronics growth story will not be written by assembly alone. Embedding Design for Manufacturing into every stage of product creation is the step that can transform ambition into global competitiveness-and make India a genuine leader in electronics.

time to read

8 mins

November 2025

Electronics For You

"It's Not About How Many Companies You Incubate— It's About How Many Are Still Standing Five Years Later."

Is IIT-M’s Pravartak just another incubator for startups? Or is it different? To answer that, EFY’s Akanksha spoke to Shankar Raman from Pravartak, and here is what she discovered...

time to read

5 mins

November 2025

Electronics For You

Electronics For You

AI Vision ASSISTANT CAMERA

The AI vision assistant camera is a smart device for image recognition and interpreta- tion.

time to read

4 mins

November 2025

Electronics For You

Electronics For You

Compact AI HEALTH MONITORING And ANOMALY DETECTION DEVICE

Early detection of health irregularities helps identify conditions before they develop, allowing timely intervention. Continuous monitoring, however, is not easy without wearable sensors that automatically track health data.

time to read

3 mins

November 2025

Listen

Translate

Share

-
+

Change font size