Your Phone May Allow Hackers to See the Screen While It Charges
Image: Pixabay

Your Phone May Allow Hackers to See the Screen While It Charges

July 30, 2025

Smartphones do more than call family and check scores: they store personal emails, banking apps and health data. But free USB charging ports at airports, hotels or public kiosks carry hidden risks. Security researchers call this threat juice jacking or video jacking: when a charging station is tampered with to mirror and record your screen activity, capturing PINs, passwords and private messages.

How Juice Jacking Works

USB ports can transfer data and charge devices. A compromised station or cable with embedded electronics can initiate an unauthorized screen share or data dump as soon as you plug in. On many devices, outdated behavior allows automatic mirroring or file-transfer modes without explicit permission, letting attackers record everything you do.

Modern OS Protections

On Android devices running Marshmallow (6.0) and later, the default USB mode is “Charging,” requiring you to open the notification shade and select “File Transfer” to enable data connections. On iOS devices, you must tap “Trust This Computer” the first time you connect (iOS 7 and later), and since iOS 11.4.1, USB Restricted Mode disables data access through the Lightning port if your device has been locked for more than an hour.

Preventing Screen Mirroring Attacks

  • Carry a USB data blocker, also called a USB condom—which limits connections to power pins only while blocking data lines
  • Use your own charging cable and adapter, plugged into an AC outlet rather than a public USB port
  • Keep devices updated: install the latest Android and iOS security patches to enforce permission dialogs and USB restrictions
  • When traveling in North Carolina, avoid unattended charging stations. Airports and conference centers rarely screen public ports. Instead, bring a portable power bank
  • Turn off your device or enable power‑only mode if available in settings
  • Use a trusted external battery pack with pass‑through charging, reducing the need for public ports

North Carolina Resources

The North Carolina Department of Information Technology’s Security Operations Center offers guidelines on safe mobile device practices. Visit it.nc.gov/security for best practices and threat alerts. Universities like Duke and UNC Chapel Hill publish campus tech advisories, check your institution’s IT page before using campus charging stations.

When to Report Suspicious Ports

If you find a damaged or tampered charging station, report it to site security immediately. In public areas like Raleigh‑Durham International Airport, notify airport police at 919‑840‑2121. Hotels and coffee shops may replace compromised ports if alerted.

By understanding juice jacking and adopting simple safeguards, North Carolinians can charge devices safely without risking privacy or data security.