Small computers disguised as USB charging ports can install a hidden malicious app created to take over and infect any IOS device. Georgia Institute of Technology research scientists created a model “Mactan” to test this concept. Without any indication of threat, researchers were able to remotely turn on, swipe, unlock and call another phone from a control device.
Once connected there’s no turning back as one second on the USB port allows access to your Universal Service ID, and automatically pairs the devices without or warning or permission. Locking the device is the only protection against such an attack, but if at any time the connected device is unlocked, it’s vulnerable.
Apple has taken this threat under consideration, and has taken precautions for IOS 7, allowing user confirmation of whether or not the host device is trusted. Unfortunately, researchers have also tapped into non-hardware techniques of bypassing apple security, and undetectably infecting devices.
For more information:http://securitywatch.pcmag.com/hacking/314361-black-hat-don-t-plug-your-phone-into-a-charger-you-don-t-own