Researchers have discovered that the defenses implemented by Apple and Google against "juice jacking," a method of data theft via malicious chargers, can be easily bypassed. Their new attack, termed ChoiceJacking, exploits vulnerabilities in the USB protocol, allowing attackers to gain unauthorized access to sensitive data on mobile devices. Despite recent updates from both companies, many Android devices remain at risk due to fragmentation and incomplete implementations of security measures.
juice-jacking ✓
+ security
android ✓
ios ✓
vulnerabilities ✓