Is it worth buying affordable third-party accessories? Instead of purchasing Apple USB-C charging cables.
With the evolving technologies, the real-world has transformed more into an online environment. This makes it easier to connect and achieve productivity. However, it also increases digital threats and cyber attacks.
Lumafield’s Jon Bruner posted on X, the high-quality CT scan of an ordinary USB-C connector. It shows the extra electronic, which might be a mini computer integrated into the USB cable.
If you can administer with the naked eye, you won’t be able to find the malicious devices. The components are too small, which doesn’t affect the shape and size of the USB-C cable.
Furthermore, he adopted the O.MG cable from researcher Mike Grover, a security and malicious analyst. But hackers would switch these security cables into spy agents.
The CT scan displayed a small Wi-Fi antenna and several chips mounted on each other to look like a microprocessor but with enough vulnerabilities. It is expected that if the cable is used to charge the iPhone or MacBook, it could transfer all sorts of data from your computer to the hacker. The malicious USB-C cable might have a keylogger that records everything you typed.
Surprisingly, the USB-C cable also has an off-switch, which accesses permission for malicious actions. Hackers could take control of your entire PC with a single third-party USB-C charging cable.
The only way to safeguard your electronic devices from these cyber attacks is to use original accessories. If you have an iPhone, opt for an in-box cable or buy from Apple. Likewise, operates authentic accessories for other brands like Google and Samsung.
Thanks for choosing to leave a comment. Please keep in mind that all comments are moderated according to our comment Policy.