About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Juice Jacking Cybersecurity Attack Solution for Consumers & Businesses

Businesses and the general public are now very wary of charging mobile devices in public venues. The Federal Bureau of Investigation (FBI) and the Federal Communications Commission (FCC) just updated their guidance on the risks of using public USB charging stations to recharge mobile devices.

The concern is a cyber-theft tactic called “juice jacking.” Juice jacking is the exploitation of a device using a modified USB cable (dirty USB cable) and/or malware to compromise a device while it is charging. Since USB and Apple Lightning cables contain both power and data connections in the same cable and connector, the exploit leverages the data connections as the device attempts to synchronize data.

An Overview Of Juice Jacking

The attack itself is a hardware man-in-the-middle attack (MitM). It uses the physical connection to compromise the device using malicious software that can extract information such as passwords, contact information, emails, etc. or install malware on the device even if it is not unlocked or jailbroken.

Threat actors (or as the FCC refers to them as “bad actors”) can then use that information to compromise online accounts or harvest the information from multiple victims for sale on the dark web. In at least a few cases, the malware has attempted to entice victims with a free promotional gift, according to The New York Times.

Juice jacking is not a new attack vector. In fact, it was first disclosed in August 2011 and demonstrated at a hacking conference called DefCon, where attendees were offered free charging stations to demonstrate the attack vector. Since then, a variety of new methods have been discovered to create dirty cables and leverage exploits to enable the compromise of a charging device.

Business Implications Of Juice Jacking

While some reading this article may consider the risk to be isolated to consumers, there are real-world business impacts to employees that might be traveling for work or pleasure.

Consider the average employee that does not travel frequently for work in contrast to a hardened road warrior who typically carries a dedicated bag of cables and adapters for charging and connectivity. The infrequent business traveler may forget to pack a charging adapter in their carry-on luggage, forget to pack one for all their device types (USB C, Apple Lightning, MagSafe or proprietary) or not have an international power adapter depending on their destination.

Their only recourse is to use a public charging station in order not to be electronically stranded. If they do use one, then they and the organization face risks of malware that could compromise their mobile devices, potentially with sensitive business information, or a multifactor authentication attack.

Juice Jacking Solution for Consumers & Businesses

Now with QimaXx new wireless charging solution Qi-Wallet, consumers and business travelers do not have to be a victim of this latest cyber threat and can now use any public USB charging stations anywhere they like to charge their devices.

At Kickstarter; Coming soon:

https://www.kickstarter.com/projects/1248189437/worlds-1st-magsafe-wallet-and-wireless-charger-fusion?ref=discovery

Media Contact
Company Name: III Hong Kong Limited
Contact Person: Qi-wallet by QimaXx
Email: Send Email
Country: United States
Website: https://www.kickstarter.com/projects/1248189437/worlds-1st-magsafe-wallet-and-wireless-charger-fusion?ref=discovery


Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.