7 surprising things that can be hacked

7:26 PM
7 surprising things that can be hacked -

We are well aware of the dangers that hackers pose to our computers, tablets and smartphones, but thanks Internet increasingly of things (IoT), which is not anything they can attack. An increasing number of devices supports WiFi and Bluetooth, which also makes them vulnerable to malicious attacks. The list of items that can be hacked develops an amazing way to include many items you might never suspect.

Self-Aiming Rifles

The TrackingPoint software can help even an amateur shooter hit the target like a pro. However, the technology for these weapons comes with Wi-Fi which makes them vulnerable to attack. Security researchers Michael Auger and Runa Sandvik have demonstrated the flaw at the Black Hat conference 2015. Hackers have altered the calculations on the scope of the rifle to make the shooter missed the target and instead hit the one of their choice. They could disable the computer from the scope and prevent the gun to shoot well.

smart tea kettles

Tea time is hardly something you associate with an attack by a pirate, but is connected IoT devices as even your kettle is vulnerable . The question that was operated with this device was a simple lack of security. With such an innocuous item as a kettle, there seems to be much less need a manufacturer to implement a series of security measures. This leaves consumers to make an important decision on materially connectivity really is.

The iKettle allows you to turn on your remote kettle using an application, which could save a few seconds of walking through the house to flip the switch you. However, the same problem can be solved by using a device with a simple timer that is not connected to the Internet. Although a tea kettle hacked with the potential to boil at random is not a huge threat, it shows how IoT can create an unexpectedly disadvantage.

digital Skateboards

digital skateboards have a small remote control that allows the driver to control its speed. While this feature is convenient, the associated technology may create an opening for hackers. The controller communicates with the skateboard using technology Bluetooth Low Energy wireless. Riders can experience problems with connectivity traveling through areas with heavy traffic Bluetooth. If an attacker were to exploit this connection, it could take control of the board, causing it to stop or reverse and throw the rider.

The refrigerator

A smart refrigerator can seem stylish new addition to your home high-tech, but as with any connected device, there are potential flaws in this system. In many cases, the IoT vulnerabilities reveal minor opportunities for an attack. However, a recent review in smart refrigerator Samsung showed how connectivity can go wrong in a big way.

The refrigerator provides Gmail integration so you can see your calendar in a finger tap. However, it did not validate SSL certificates. This would allow hackers to launch a man-in-the-middle attack and steal the Google log-in information of the user.

The grid

Although you can not give it much thought, very electric grid that you rely on for everything from the lighting in your home to charge your phone is controlled by computers. In the summer of 2015, the Federation of American Scientists (FAS) has discovered a Congressional Research Service report revealing that the power grid of the country is faced with attacks increasing. The report found vulnerabilities in the grid that could allow hackers to insert malware into the system, which could cause untold havoc.

Your Car

Thanks to their wireless connections, a number of cars are now vulnerable to zero-day attack potential. Hacker Charlie Miller and Chris Valasek have demonstrated their ability to hack a Jeep Cherokee, the management of the radio, air conditioning, wipers, transmission, brakes, engine, and more. The same connectivity that makes it very practical driving can also be dangerous if operated by the wrong people. Fortunately, automakers take note of vulnerability and many are taking steps to patch these vulnerabilities.

Baby Monitors

baby monitors fall under the category of safety equipment, but recent research has shown that they are anything but safe. Many baby monitors have been tested, revealing numerous vulnerabilities. One of these pirates provided access to previously recorded video and stored on the Internet. On another monitor, hackers have successfully launched a valid streaming session and spy on it. All weaknesses were quickly reported to manufacturers, who work diligently to make the safest technology. However, this is an excellent example of how easily a hacker can get a peek in your private home.

Today the connected devices can include everything from your thermostat to your home shows. While growing IoT offers an unprecedented level of control and convenience, it is important to recognize that it can also present some new threats that were unthinkable in the past decades. Stay abreast of vulnerabilities in your connected devices and take steps to protect your business as much as possible. Even something as simple as using a VPN like Hotspot Shield can give you an extra layer of security.

Previous
Next Post »
0 Komentar