Latest News RSS

What is the devices functionality? How does the DataBlock device prevent accidental data exchange? What is the size of the device? What are common security problems that DataBlock solves? Can I keep the DataBlock device on my USB cable at all times? Where should I use the device? Are all Charging stations unsafe? What is the weight of the device? How do I use the device? Who will the device be sold to? Where can I purchase the device? How much will the device be sold for? If I purchase the device in bulk will it be at a reduced...

Read more

A true story “I use my smartphone to store everything - from passwords and bank details to meeting locations and client details. I even make private notes on my smartphone so that I always have access to them. My phone is my personal computer,” says Mickey R, a head hunter at a renowned multinational company. He goes on to admit, “although I make it a point to carry my phone charger, there have been several instances when my phone ran out of juice, and I plugged it into the nearest charging booth.” When asked if he thought that public charging...

Read more

Protection Against Juice Jacking Smart devices make life easier but can become a double-edged sword in an environment of increasingly innovative and sophisticated cyberattacks. An innocuous-looking charging station can be weaponised by bad actors seeking to steal private information or carry out espionage.   The risk that a charging port can infect or take over smartphones or smart devices is very real. However, the threat is realised only once charging has occurred. As is the case in other types of cyberattacks, human behaviour becomes an enabler of juice jacking, the technical term used to denote a method employed by cybercriminals...

Read more