Image by Kap Maceda Aguila
The airport: our gateway to travel and often a much-earned vacation. But once there, we are bombarded with mental load, from making sure we have our passport and ticket, to checking in on time, to going through security checks, and more. The stress of it all leaves us vulnerable. We worry we might have forgotten, dropped, or left something at home that we actually need for the trip.
But these days, it isn’t just physical things we should be concerned with. We also have to think about securing our personal data, because leaving it unprotected could lead to much worse things. What may surprise some travelers is that stealing information is now possible even without devices leaving their owners’ hands. The seemingly harmless act of using free airport charging ports can compromise data security.
Just as travelers should be wary of connecting to free Wi-Fi options, they should equally be cautious of recharging gadgets through these available ports. The Transportation Security Administration (TSA) of the United States reports that doing so could result in malware being installed into gadgets. This type of software can lead to unauthorized access to personal data or disrupt a device’s operation.
The term for the criminal act is called “juice jacking” or “port jacking.” While a gadget is connected, malicious software infiltrates gadgets or enables hackers to access the personal data, bank applications, e-mail, and social media profiles of other people. This increases the risk of these being compromised, money being lost, or profiles being used without permission.
There are instances when travelers were hacked through RFID (Radio Frequency Identification) - the chips used in credit cards or employee badges to provide access or enable processing of transactions. Hackers are able to collect information and clone credit cards, for example, and make unauthorized transactions with these. Building security can also be compromised by criminals who steal credentials from workers of a specific property. This enables them to access a company’s premises, for example, and even gain access to its internal systems.
Amidst these threats, the good news is that travelers have several options to protect themselves from these nefarious characters.
Here are some tips:
- Your Trusty Power Bank. The power banks you own are safest as they are, well, yours. Before leaving, make sure these are charged to an optimal level so they can be dependable during your travel.
- Check for Red Flags. If you are left with no choice, inspect the charging point for any signs of tampering. Check your gadget’s screen from time to time, if it asks you to trust a device you have to connect with, for example. If you did not initiate such an action, decline the option. Common sense dictates that you need not connect to another device if you only need to charge a gadget.
- Go Traditional. Why not bring an AC charger and use the wall outlets? There are airports that provide this option and experts consider this a safer way to charge devices.
- Charge at Home. Make it a habit to fully charge devices before you leave for the airport. Doing so gives you one less thing to worry about, especially if you know that charging spots can get too crowded.
- Rest Your Devices (and Your Eyes). While the wait for your flight could be long (and boring), use the time to do something else. Talk to people you’re traveling with, bring a book, make a list of your travel must-buys and must-dos, or enjoy people-watching. Some of us are often too glued to our screens, so it’s a good time to rest your gadgets and rest your eyes away from the screen.
- Be notified. Secure your credit card transactions by enabling two-factor authentications and signing up for transaction alerts to be sent to your mobile phone. Banks include warnings in notification text messages and give you the number to call in case you notice an unauthorized transaction.
- Invest in your protection. It’s better to be safe than sorry, right? Consider protecting your cards by getting an RFID-blocking wallet to block hackers from getting your information.