top of page

Staying Safe on Public Devices

In today's interconnected world, it's easy to take advantage of the convenience of public outlets and Wi-Fi. Whether you're charging your devices on the go or quickly checking your email at a coffee shop, these public resources offer a level of convenience that's hard to resist. However, the convenience comes with potential risks that every user should be aware of.

Public outlets may seem harmless, but they can pose significant risks if not approached with caution. Cybercriminals have been known to install compromised outlets or use techniques like "juice jacking" to steal data from unsuspecting users. Avoid using USB charging stations from unknown sources, as they could be used to install malware on your device or extract sensitive information. The first stirrings of juice jacking sprouted in 2011 at a hacking convention known as DefCon where a false charging kiosk would be set up. Users who plugged in their devices would have their screen go black and then flash to the dangers of possible malware injection from public charging stations. Due to the risk that juice jacking can pose, many officials, such as the Federal Bureau of Investigation, have been warning the public about the danger and how to best avoid it. 

Imagine you're at a library and decide to use one of their public computers to check your email. You log in to your email account, browse through a few messages, and then log out before leaving. Seems harmless, right? However, there are several potential risks associated with using public computers in this scenario. Public computers may be infected with keylogging malware that records every keystroke you make. This includes your usernames, passwords, and any other sensitive information you type. Lastly, many public computers in libraries or other institutions use shared user accounts. This means that other individuals who have used the same computer before you may have left behind cookies, cached passwords, or other traces of their online activity. If you're not diligent about clearing this information after your session, it could be accessible to the next user or even malicious actors.

While public outlets, computers, and shared technologies can be convenient for our everyday lives, they come with inherent risks. By staying informed and adopting best practices for cybersecurity, you can minimize the chances of falling victim to electrical hazards, data theft, or other cyber threats. Remember to always stay vigilant when it comes to the safety of your devices and information on public resources, and never hesitate to ask for assistance or clarification if something seems amiss.

Stay aware, and stay safe!

1 view


bottom of page