Smartphones Twice as Dangerous as USB Flash Drives When It Comes to Corporate and Personal Safety

Share Article

ChargeDefense issues a special alert on the current state of smartphone data security.

There is a very real possibility of having your personal information hacked from your smartphone this summer. ChargeDefense, a pioneer manufacturer in mobile charging devices, has published a special report on the current state of smartphone data security.

In the past couple of years identity thieves and hackers have become even more sophisticated, shifting their attention to mobile devices. Alcatel-Lucent’s Kindsight Security Labs report states that mobile malware infections grew 20% in 2013 and another 25% in 2014 with estimates of 18 million infected smartphones and growing quickly. In 2014, Microsoft further showed that 5 out of 10 malware instances were worms spread by USB removable drives and revealed that malware infections via USB storage devices were responsible for 26% of the total infection rate.

The article goes on to discuss protocols of many IT departments prohibiting USB flash drives yet allowing smartphone, a USB device, to still connect. The article further connects corporate enterprise hacking successes to USB-connected smartphones.

However, education, training and policies might not prevent an employee with a 5% charge left on their phone from plugging it into a USB port on his work. This small and harmless act can bring down an entire network if lurking malware on the phone can circumvent policies intended to thwart it. In fact, that is how the majority of USB Enterprise security breaches happen…Simply implementing policies to disallow USB connections is not 100% effective. A combination of education and training, port blockers, and power-only charging solutions [like the Juice-Jack Defender] is an inexpensive, practical way to keep honest employees from infecting your enterprise and exposing corporate and personal information to the bad guys.

The entire report and the infographic on “Types of Mobile Malware” can be found at and available for syndication with attribution. In addition, ChargeDefense has posted an animated video to demonstrate how this hacking can occur with the real world example of 2010’s Stuxnet virus.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Jeny Dowlin
+1 (865) 919-7285
Email >
Visit website