More stories

  • in

    Warning: Protect your phone from choicejacking before it’s too late – here’s how

    Elyse Betters Picaro (with graphic elements from Ameythyststudio, Aleriimingirov, and Romansa design art via Canva) / ZDNETGiving your phone some extra juice via a public charging station is always a handy option, but it may not be a safe one. As described in a new report from NordVPN, cybercriminals can now turn to a trick called choicejacking, in which they’re able to transfer data from your phone to a device disguised as a charger.What is choicejacking?With this new method, a malicious device that looks like an innocent charging station or port manipulates different functions on your phone. In doing so, your phone is tricked into connecting to the device via data transfer mode without your input or permission. Once that connection is made, the criminal’s device can access and steal your photos, documents, contacts, and other personal files. Also: 7 ways to lock down your phone’s security – before it’s too late”Choicejacking is particularly dangerous because it manipulates a device into making decisions users never intended — all without them realizing it,” Adrianus Warmenhoven, a cybersecurity advisor at NordVPN, said in the report. “Whether it’s granting access to data or downloading malware, these attacks exploit the trust we place in everyday interactions with our smartphones.” Advanced upgrade to juicejackingChoicejacking is actually a more advanced upgrade to the older practice of juicejacking. With juicejacking, hackers install software on charging stations at airports and other public spots that can then automatically scoop up data from your connected phone. In certain cases, your phone may lock down, preventing you from stopping the transfer before it’s too late. Also: Traveling this summer? Consider this before using airport Wi-Fi and charging portsJuicejacking first popped up way back in 2011. But in a win for the good guys, mobile OS developers cooked up a way to stop this threat. Let’s say a smartphone connects to a charging station. If the station indicates that it supports Media Transfer Protocol (MTP) or Picture Transfer Protocol (PTP) for data transfers, that means it’s likely a hacker’s device impersonating a charging station. In that case, the user is asked whether they want to allow a data transfer or just charge the phone. But in the latest twist, researchers from Graz University of Technology in Austria found a way to bypass the OS-level protections against juicejacking. Malicious devices can now impersonate USB or Bluetooth input devices to enable a data transfer mode. Affecting Android and sometimes iOS devices, this tactic can use such technical methods as keystroke injection, input buffer overflows, and protocol abuse to complete a data transfer in as few as 133 milliseconds. Also: The best power banks you can buy in 2025: Expert tested and reviewed”Choicejacking represents a dangerous evolution in public charging threats,” Warmenhoven added. “With a single deceptive prompt, attackers can trick people into enabling data transfer, potentially exposing personal files and other sensitive data. Public USB ports should never be treated as safe, and awareness is the first line of defense.” More

  • in

    This handy Linux tool snitches on sneaky apps – here’s why and how it’s helpful

    Jack Wallen / Elyse Betters Picaro / ZDNETOpenSnitch is a Linux port of the popular MacOS app Little Snitch. This app is essentially an application firewall that tracks network requests from apps, so you can create rules to block or allow those requests.Why is that important?Also: 7 things every Linux beginner should know before downloading their first distroSay, for example, that you’ve installed a Linux app that shouldn’t require internet access (those do still exist). You’re using that app with OpenSnitch running, and it reports that the app has made an outgoing internet connection. What gives? That shouldn’t be the case. It’s possible the app is sending telemetry (which could include information about your activity) to some third party. You don’t want that. Also: You can try Linux without ditching Windows first – here’s howWith OpenSnitch, you’ll know when these things occur, and when they do, you can take action to block those outgoing requests. This is a great tool to help you keep your privacy and security intact. Let me show you how to install the app and how it’s used.How to install OpenSnitch What you’ll need: I’m going to demonstrate this on Ubuntu Linux 24.04. OpenSnitch can also be installed on Fedora-based distributions, and you’ll only need to modify the installation commands. So, you’ll need a running instance of an Ubuntu-based distribution and a user with sudo privileges. That’s it. Let’s make it happen. More

  • in

    Your Roku TV is getting 4 useful features for free – including a new ‘Surf Mode’

    Maria Diaz/ZDNETIf you’re dealing with streaming overload and can’t decide what to watch, Roku is rolling out new free features to help make your decision a little easier. Designed to help you discover new shows, these features showcase trending content, new content, and what’s in theaters now. There’s also a new “Surf Mode” that brings Reels and TikTok-style viewing to your TV.What’s new on RokuTop trending: Roku will let you see what everyone is watching with new “Top 10 Movies” and “Top 10 TV Shows” rows. These rows, which refresh daily, will spotlight the most searched titles across Roku’s expansive library. You’ll find them under the “New & Popular” tab as well as the Movies and TV destinations. More

  • in

    We tested iOS 26 on the iPhone 16 Pro – these 5 features make the update worthwhile

    Kerry Wan/ZDNETApple introduced iOS 26 to the public at its annual Worldwide Developers Conference event in early June, and since then, has been polishing the software with developers for the eventual beta release. Now that it’s finally available for everyone to test, you may be wondering if it’s worth diving straight into or waiting for the official software launch — likely sometime in September. That’s what we’re here to answer.Also: You can download iOS 26 public beta right now – how to install (and which iPhones support it)To set the stage, Apple’s iOS 26 offers a refreshing new look, more streamlined first-party app layouts, more functionalities across popular services, and some smaller Easter egg features that greatly enhance your iPhone’s usability. My ZDNET colleague Kerry Wan and I have been testing the public beta (via Developer Beta 4) for the past few weeks, and here are our biggest takeaways so far.1. Visual Intelligence is almost ready for primetime More

  • in

    5 Linux distros for businesses looking to save money and protect their assets

    AlexSecret/Getty Businesses around the world may not realize this, but they absolutely depend on Linux and open-source. Without those two pieces of technology, we wouldn’t have nearly the services and sites we now enjoy. But Linux isn’t just a good option for servers and technology stacks. Linux is also viable as a desktop operating system. […] More