#1
ne of the most innovative and modern hacking methods is devices like smartphones that use the same USB cable for data transfer and charging.

Typically, this attack occurs at public charging points that can be found in airports, train stations, and shopping malls.

Malware infection attack – Hackers use "juice jacking" attacks to take control of a device with a variety of malware, including malware, trojans, spyware, keyloggers, and other forms of malware. Malware remains on the device until the user or individual detects and removes it.
Data Theft –  Jacking can lead to data theft from connected devices. The user does not even suspect that his confidential personal information has actually been stolen. The level of risk depends on how long the smartphone is connected to the vulnerable port. Hackers can easily copy all the data on a device if given enough time.

How to protect yourself from Joyce Jack?

The easiest way to avoid an attack is to not use public charging points. Carry a power bank as a backup device to charge your smartphone.
Never use a USB cable provided by a public charging station. Always carry your charging cable with you.

Like Hackerman