[video] Juice Jacking: How hackers easily invade your smartphone

Check out this great example and easy-to-understand story from WKYC on how a hacker can easily invade your phone and what you can do to stop it. One of the reporters will actually do this to the anchor!
This is exactly why we developed the Juice-Jack Defender to help. Get one for yourself. Get one for your loved ones!

Continue Reading →
0

10 Types of People Who Love Our Solar Charger

SOLARCHARGER_PeopleThis July marks 30 years of celebrating National Park and Recreation Month and the enduring importance of parks and recreation for the world. From the start, parks were created to serve the people—to give them a place to appreciate nature, exercise, socialize and have fun.

The NRPA has established a contest in conjunction with this month’s celebrations – learn more here >>

We encourage you to get out there, enjoy the parks ...

Continue Reading →
0

[infographic] Managing a Mobile Threat

We had to share this great infographic on cyber attacks. The threat is real. IT departments cannot do everything. Keep yourself and your organization safe by purchasing a Juice-Jack Defender. It’s partly why we priced them so low – to make them affordable for almost everyone to get at least one. Use the Juice-Jack Defender not just when you at a public-charging station but also charging your phone or tablet off your company laptop.

Continue Reading →
0

[infographic] Types of Mobile Malware

In connection with our article and animated video that launched today, we also wanted to share this infographic to better inform consumers on mobile malware.

In the past couple of years identity thieves and hackers have become even more sophisticated, shifting their attention to mobile devices. Malware applications originally developed for Windows operating systems are rapidly being migrated to attack mobile platforms. A February 2015 report from McAfee showed a 6x increase in mobile malware over a two-year ...

Continue Reading →
0
Page 2 of 8 12345...»