Protection against juice jacking

Given the recent FBI recommendation to avoid using free charging stations and public USB ports (https://twitter.com/FBIDenver/status/1643947117650538498) I wonder if our iOS and Android devices are protected by Norton against "juice jacking" and if so, how it works. If not, is this protection on to-do list?

Thx @Vishal Srivastava for the info. Coupled with answer of @peterweb (1st reply) it's clear to me.

Why is ‘Juice Jacking’ Suddenly Back in the News?
https://krebsonsecurity.com/2023/04/why-is-juice-jacking-suddenly-back-in-the-news/

Juice jacking can infect user device with Malware. N360 app will protect user against Malwares. 
N360 System advisor feature will warn if “USB debugging” is enabled as it can make device more susceptible to such attack.

Possible attack vector includes possible zero-day iOS vulnerabilities. In this scenario we can monitor and advise our customers to update to the latest version of the OS as soon as possible. N360 device protection feature and smart scan feature include that option.
One more possible attack vector would utilise violation of OS sandbox on jailbroken device. Our apps have jailbreak detection implemented.

Refer https://us.norton.com/blog/mobile/what-is-juice-jacking

Please note that, any normal data transfer on iOS, wired or not, has to be explicitly approved by the user. User’s own actions outside of our apps cannot be controlled  by us.

OK thanks @peterweb. It's not that I don't trust your reply and as I said it gives sense. I would just like to know if devs have investigated this kind of threat.

I have escalated this thread to try to get an official reply.

 

@peterweb - Thank you for the explanation. It makes sense but still have Norton labs tested protection specifically against this threat? Better to have actual results than just assumption.

@bjm_ - Thanks for the educative reading.

What Is “Juice Jacking”, and Should I Avoid Public Phone Chargers?

I'm not sure that Norton could protect against the "juice jacking", but the protection from any malware that might be introduced from this method would be detected as it would if it was from any other source such as emails or internet browsing.