-
Products
-
-
COOKIES
Our website uses cookies and similar technologies to personalize the advertising shown to you and to help you get the best experience on our website. For more information, see our Privacy & Cookie Policy
COOKIES
Our website uses cookies and similar technologies to personalize the advertising shown to you and to help you get the best experience on our website. For more information, see our Privacy & Cookie Policy
These cookies are necessary for basic functions such as payment. Standard cookies cannot be turned off and do not store any of your information.
These cookies collect information, such as how many people are using our site or which pages are popular, to help us improve the customer experience. Turning these cookies off will mean we can't collect information to improve your experience.
These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third-party providers whose services we have added to our pages. If you do not allow these cookies, some or all of these services may not function properly.
These cookies help us understand what you are interested in so that we can show you relevant advertising on other websites. Turning these cookies off will mean we are unable to show you any personalized advertising.
Will online mobile power bank steal mobile wallets and bank cards? Experts say it is unlikely
2021-12-13
Recently, a video of mobile power bank stealing mobile wallet and bank card went viral. In the video, a man demonstrated the disassembly of a mobile power bank and found that the mobile power bank had hidden secrets: the mobile power bank was installed as a device that could steal user privacy, such as bank card information, identity information, etc. As long as you connect your mobile phone with these mobile power sources, you can plant a Trojan horse virus into your mobile phone. The Trojan horse virus steals relevant privacy data and transmits it to criminals. Mobile wallets and bank cards may be stolen.
So is it true that mobile power banks steal mobile wallets and bank cards?
Related mobile communication experts said that for the several devices displayed by the netizen, it is almost impossible to steal user privacy in this case.
Normally, to transfer data to the phone memory, you need to turn on the USB debugging mode. The current security policy of mobile phones generally turns off USB debugging by default, and needs to be turned on manually when transferring data. There is already a barrier at this step. The process of stealing the key information of the mobile phone is very complicated: enable the USB debugging mode-ROOT the mobile phone-by modifying the system-implanting a Trojan horse to steal the key information-transmitting information. Through the mobile power structure in the video and the simple assembly of several devices, this set of theft process cannot be completed at all, and users should not worry too much. For low-quality mobile power supplies, it is more important to prevent safety hazards such as fire, explosion, and damage to mobile phones during use.
How to use mobile power safely
How to use the power bank safely
1. Proper charging
Avoid recharging the mobile power when the power is exhausted.
2. Don't play with your phone while charging
When the smart phone is charged by a mobile power supply, it is best not to answer calls or play games while charging, as this may damage the mobile power supply and the mobile phone.
3. Avoid falling
If the mobile power supply falls, it may cause internal or physical damage, which may cause a fire or even an explosion.
4. Use temperature
When charging a smartphone through a mobile power supply, heat is inevitable during charging. Pay attention to the temperature of the mobile power supply.
Details: How to use and store the power bank correctly?
At the same time, for your privacy and mobile phone security, we suggest you:
①Try not to connect mobile power sources from unknown sources. These mobile power sources may have potential safety hazards;
②Connect to the mobile power supply, and also need to turn on the USB debugging operation, please unplug the mobile power supply quickly;
③Do not open the "USB debugging mode" or trust authorized operations;
④ Try not to ROOT for Android phones and try not to jailbreak.
In the era of mobile Internet, mobile phones have long become the most indispensable part of people's lives. But in the process of using, we must also be vigilant to ensure that security issues are eliminated when using the mobile phone.
Key words:
Previous:
Related News
Contact Us
E-Mail:
Tel:
Website:
Address:
Address:Room 1005A, New Century Trading Center, No. 2-6, Hongde Road, Haizhu District, Guangzhou
Moogmax
Free Consultation
Please leave your contact information and our professionals will contact you as soon as possible!
Guide
Public Account
