. The reason is that the cord used to plug in your mobile phone is also used for sending data to and from the device . For example , if you connect your iPhone to your Mac device using the same charging cord , you can easily transfer images and music from your mobile to your Mac . Hence , through compromising this particular cord , a hacker can extractAttack.Databreachall sorts of data from your mobile including pictures , emails , contact numbers , SMS messages , etc. , without your knowledge obviously . The company installed a charging station at its stall and offered to charge cords to visitors so that they could charge their devices . Then the security firm ran a social experiment to analyze the number of people who used this charging service , which turned out to be quite overwhelming with over 80 % of the audience using the charging facility provided by Authentic8 . Paik noted that none of these visitors seemed to care about the security aspect of charging mobiles from a public station despite the fact that they were attending a security conference . The repercussions are various and diverse , which is why Paik recommends that instead of putting their data in danger , users must carry their chargers or invest in portable USB battery pack . They may also buy USB cords of their own and connect the chargers using their ports . The bottom line is that , if you are concerned about the security of your phone ’ s data , it is better to stop using public ports at all .