logo
logo
Sign in

Disadvantages of charging a phone with a computer USB cable

avatar
ali5280
Disadvantages of charging a phone with a computer USB cable

Charging your phone with USB PC and the possibility of mobile phone battery failure this way is one of the questions that all users have. Well, you see a lot of people who connect their phone to a computer or laptop without a charger and only with a USB cable and use the power of the USB port to charge their phone battery. USB ports have about 5 volts of electricity and also have about 0.5 amps or 500 mA. The desired voltage for charging smartphone batteries is generally the same as 5 volts, but almost all smartphones need more than 1 amp to charge their phone, which is mentioned on their charger. The question is, will this amp change be problematic? It certainly is. In addition to charging the phone via USB, it will increase the charging time of the phone, which can drain your phone's battery over time. Also because USBs are not made to charge phones. There are many voltage changes, and voltage changes mean the gradual death of the phone battery, and the only device that can provide very smooth and unchanged voltage to keep the battery healthy is your phone's main charger. But if you had to do it once or twice. If possible, use the port on the back of the case. This is because the front ports, due to the use of wires to transfer them from the motherboard to the front of the case, cause less amps due to the resistance of the wires inside the case, which worsens the situation. Many people use micro USB cables for this purpose. Serious danger of charging your phone by connecting to a computer If you are one of those people who think that charging a mobile phone using a computer is a safe way, you are completely wrong. Suppose you are working with your computer and suddenly you hear your mobile phone warn that it is charging. According to security experts, connecting a mobile phone to a computer for charging, which seems like a very simple task, can be a green light for hackers to infiltrate your mobile phone. According to research conducted at Casper Sky Lab, connecting an iPhone or Android device to a computer allows all information to be exchanged between the two devices, the mobile phone and the computer. This information can include name, manufacturer, type, serial number, operating system information, software information, system files, and mobile or device electronic chip ID. According to this security lab, some people think this information is not important, access to this information is enough to hack and control your device. Also read: 10 ways to increase iPhone battery life Researchers using a personal computer and a normal USB cable, easily and without attracting the attention of the mobile phone user managed to install the root application on a test smartphone. This is not the first time that information has been stolen from a mobile phone connected to a computer. In 2013, the Red October group used this method to hack mobile devices. The hacker group was able to install malicious software on cell phones by connecting computers that were connected to cell phones. In both cases, hackers found a way to hack into the secure exchange of information between a computer and a cell phone connected to that computer. By examining the identification information from the device connected to the computer, the hackers were able to find the type and model of the victim's cell phone and then use this information to enter the cell phone. Of course, accessing this data is easy and practical if the option of exchanging information between PC and mobile phone is enabled when connected in mobile phone settings. According to Alexei Camaro, a researcher at Casper Sky Laboratory, the security risk increases when you regularly use the computer to charge your mobile phone. Because in this case, your mobile phone ID is easily traced and ransomware and adware will easily fit on your mobile phone. Even if you are not a professional in hacking mobile devices, just search the web and the internet and see that you can easily become a hacker. This means that your cell phone can be hacked more easily than drinking water. But if you are worried about your mobile phone being hacked, it is better to follow these three security steps provided by Casper Sky Lab: If you want to use a computer to charge your mobile phone, it is better to make sure the USB cable and computer are secure. Become. Use a password or other security method, such as fingerprint authentication, and never unlock your cell phone while it is charging. Use data encryption technology on your mobile phone, ie encrypt important mobile information to prevent theft. Using and installing some antivirus software that can detect malware on your mobile phone can be helpful. We hope you like this article. Write your comments for us.

https://irtechnology.farsiblog.com/1400/09/08/%D9%85%D8%B6%D8%B1%D8%A7%D8%AA-%D8%B4%D8%A7%D8%B1%DA%98-%DA%A9%D8%B1%D8%AF%D9%86-%DA%AF%D9%88%D8%B4%DB%8C-%D8%A8%D8%A7-%DA%A9%D8%A7%D8%A8%D9%84-USB-%DA%A9%D8%A7%D9%85%D9%BE%DB%8C%D9%88%D8%AA%D8%B1/

collect
0
avatar
ali5280
guide
Zupyak is the world’s largest content marketing community, with over 400 000 members and 3 million articles. Explore and get your content discovered.
Read more