Juice Jacking Attack

Juice Jacking Attack: How It Puts Your Data at Risk