I need Juice Jacking cybersecurity experts, affected parties, and agencies and organizations warning, reporting, or researching the USB charging exploit. While the TSA has recently issued a warning, neither Juice Jacking nor this topic are limited to airports.
1) Who is most at risk for juice jacking attacks, and are there any demographic or behavioral patterns among likely victims or easy targets?
2) What specific types of malware or data theft methods are most commonly (likely to be) used in juice jacking attacks, and how do they evolve?
3) Why have actual documented cases of juice jacking remained so rare despite repeated warnings?
4) When did juice jacking first become a recognized threat, and how has the nature of the threat changed over time?
5) Where else—beyond airports and public venues—could juice jacking occur, and are there emerging hotspots?
6) How effective are current device protections (such as USB data transfer prompts and OS updates) at preventing juice jacking, and what new security measures are in development?
7) Do you have a proven Juice Jacking incident from the wild you can share?
8) What is the new variant known as ChoiceJacking?
9) How can businesses and consumers avoid Juice Jacking?
posted6/11/2025
deadline6/19/2025
processing
published
Recently published by Communications of the ACM
Looking for High School or College Teaching Gen AI literacy.
I need cybersecurity, vulnerability, and threat intelligence experts, and companies hit with these attacks.
Security holes—finders, keepers, and big losers
‘It’s mine! I saw it first!’ That’s what you might expect to hear from children fighting over an interesting discovery. Whether lost money, a toy, or something only an adult should have (use your imagination), children will claim the right to keep it, show it off, and maybe even trade it for something. That’s how cybercriminals respond to finding zero-day vulnerabilities—those holes in networks, computers, and software no one else knows, and no one has had a chance to fix. They will keep it to themselves until they plan to use it in an attack, or they will sell it on the dark web.
Based on the latest statistics, threat actors had much to celebrate recently regarding zero days. According to a 2025 H1 ForeScout Vedere Labs research report, zero-day exploits increased 46% over the previous 12 months.
Questions:
Who is responsible for discovering and exploiting these zero-day vulnerabilities?
What have been the effects on victim companies and affected users? How quickly have companies responded to these zero days?
What significant product lines or technology stacks are affected? How are companies adjusting their vulnerability management and security processes? Are those measures effective?