Top 10 surprising things that can be Hacked
(Read Till The End)
Did you know that hackers could actually take over your car or your entertainer, TV..? Here are 10 unexpected things that can be hacked…:
10. TV 📺
Most new televisions are no longer simply devices that receive video through satellites or cable, instead they come fully equipped to connect to the internet, allowing them to access apps and services such as Netflix and Hulu. Research from a number of security experts has shown that smart televisions are just as vulnerable to hack as phones and computers. Malicious code can be introduced through programs like Skype, Twitter and Facebook, We can then use the compromise TV as a part of a Bot Net or use built-in cameras to spy on people. Another security firm detailed how to exploit in some televisions allowed hackers to steal sensitive information stored in cookies. To get the data, a person simply had to be within radio range of the device. The exploit would even allow hackers to download personal files.
9. Car 🚗
The same remote-controlled security systems that protect cars from burglars, may open up to cyber-attacks. In 2010, researchers and automotive electronic security, demonstrated that a physical device could be installed in a car to give remote access to a malicious third-party. Since then, the ability to take over a car controls from a far, has only grown. A study published in 2011 by the same researchers demonstrated that there are multiple wireless ways to access a car remotely. Systems like OnStar which can disable and drive a car if it’s reported stolen, can be accessed through cellular networks. What can attackers do once they’ve gained access to your car? They could take over brakes, lights and engines, That’s a problem. This is actually accomplished by 2 cyber security researchers in 2015, when Charlie Miller and Chris Valasek remotely compromised a jeep cherokee, They were able to disable the car’s transmission and brakes and while the vehicle was in reverse, take over the steering wheel, These were all possible by abusing existing functionality in the car like the self parallel parking feature and commanding the vehicle to do things within the vehicle’s limitations, for example, the steering wheel could only be controlled when the car was going in reverse below a certain speed, that’s because the car’s central computer had checks to ensure that the car would only steer itself when it was in the Auto-park mode.
Learn More: Car Apps can kill You!!
8. Home Assistants 📶
Octobet 21st 2016 saw massive internet outage after hackers flooded in a major internet gatekeeper for sites like Facebook, spotify and Netflix with false bandwidth from an ocean of unsecured internet-connected devices. Many of these devices were reportedly smart home gadgets using standardized manufacturer default passwords. It’s alarmingly easy for hackers to search the web for these devices and then with the right malware, take control of them in mass. From there the hackers can use their army of hacked devices called a Bot Net to overwhelm whatever server they aim it at. The episode raises some serious questions about the smart home. More and more people are filling their living spaces with an ever-increasing number of internet connected devices. That means more potential fodder for the next big Bot Net and fears of even bigger attacks in the future. what are today’s more valued targets for hackers? It’s the trendy AI assistance (Artificial Intelligence assistance) that are making ways in the tech space. Devices like Amazon echo raised huge security concerns as they are constantly listening to the conversations around them, Activating once ‘awake’ word is said. Amazon had addressed these issues by encrypting the recordings stores and its servers, but it’s still enough invasion of privacy to make the everyday user a little cautious, while alexa amazon echo is always listening to khoobi robot an AI assistant that was unveiled at the 2016 consumer electronics show is always listening and watching. since these devices are both bluetooth and Wi-Fi enabled, it provides prime fodder for hackers to get into them, if they can break the encryption.
7. Printers 🖨️
A number of researchers have found a way to hack printers. Using exploits in widely employed weak encryption, they were able to insert malicious code in to the decice’s firmware and effectively take control of it. The exploits are possible because many new printers now use Wi-Fi so people can print their documents wirelessly. Researchers believe that by taking over the printers they could perform a variety of actions, including causing it to self-destruct. Some thermal chips automatically shutdown printers permanently if they reach a certain temperature, in order to stop the risk of fires, and hackers could cause printers to reach those temperatures by forcing them to perform the same action repeatedly. Other threats include the possibility of hackers stealing information present on any documents that are printed. Additionally, once any malicious code gets onto the printer, it could be very difficult to remove as traditional methods, such as anti-virus software, would not be effective.
pacemaker hacking feels like a Hollywood plot, assassinating someone by taking over the medical device that controls his heart? surely that is impossible in the real world….. Actually, it’s totally possible.Hackers were able to successfully kill a medical mannequin by the name of I-Stan by wirelessly hacking into its electronic pacemaker. I-Stan was a medical mannequin developed by the University of South Alabama to simulate human cardiovascular respiratory and neurological systems. Research hackers were able to destroy I-Stan through repeated denial of service DOS attacks to the wirelesly connected medical device. Obviously a medical mannequin is not the same as a real human being, However this really opened a lot of eyes in the medical industry and exposed the well documented secret that medical devices are extremely vulnerable to attacks. If that isn’t enough to scare you, last year a researcher demonstrated a pacemaker hack in Australia with a virus that could conceivably spread from one person to every electronically assisted heart within 30 Feet.
Sharing Is Caring…^_^
5. Controlling Computer Mouse 🖱️
With a 15-dollar dongle, researchers at Best-Field were able to sniff traffic from PCs, MACs and LINUX machines that use non bluetooth wireless mice and keyboards, thanks to the un-encrypted communication employed by 7 different wireless dongle vendors. The so called MOUSE-JACK attack exploited 9 vulnerabilities across devices from Logitech, Dell, HP, Lenovo, Microsoft, Gigabyte and Amazon basics.The researchers could take control of the input devices and ultimately infiltrate the machine and their network from a distance of 100 meters from the victim’s machine.The hacker exploits wireless protocols that operate in the 2.4 gigahertz band and don’t encrypt communications between a wireless mouse and it’s dongle. An attacker then could spoof a mouse and insert his own clicks and inputs to the dongle and generate keystrokes instead of mouse clicks on the victim’s computer.
4. Plane 🛬
It’s the prospect of a terrorist taking over an airplane is never a pleasant one and given the today, a plane can almost pilot itself, all that a potential hijacker has to do is get on to the airplane’s computers. He doesn’t even need to be on the actual airplane. This is well within the realm of possibility, there’s going to be a demonstration on how to remotely hack an airplane at an upcoming security conference. The complete attack will be accomplished remotely without needing physical access to the target aircraft at any time and a testing laboratory will be used to attack virtual airplane systems. This is apparently a particular worry for higher-end corporate jets, which may be more vulnerable than traditional commercial jets because they offer easier external access to internal computer systems, which is great for fast communications but also for hackers. surely air-traffic controller’s safe.. unfortunately not. Past security conferences have demonstrated that the future air-traffic control console can be overwhelmed by false signals.
3. Baby Monitors 👶
Baby monitors have evolved over the last decade to become far more sophisticated, allowing parents to keep tabs on their children much more reliably. However, their increased reliance on technology has led them to become a target of hackers. Some monitors output a signal at all times, and with passwords either not set or left at their default setting, this allows anybody within radio range to access the audio. Models that also output video are vulnerable to being used to spy on rooms. A high profile example of this came when a baby monitor in a 2-year old’s bedroom was hacked, allowing a stranger to shout out of the speaker and control the camera. Luckily the child slept through the incident, but it served as a warning to the parents, that such devices are vulnerable if not better protected.
2. Traffic Signals 🚦
Experiments carried out by researchers have shown that traffic lights can be remotely hacked. One exploit involves altering sensors on roads to relay false information. By forcing the sensor to report that a road is jam-packed, the traffic lights automatically adjust their default schedules to allow more cars to pass through junctions. The sensors don’t use any kind of encryption, allowing anyone to alter information going to traffic control centers. Another hack involves traffic signal preemption. Many traffic light systems are fitted with functions that allow emergency vehicles to pass through quickly. Although the sensors are encrypted, hackers are still able to access some older systems and alter traffic lights as they please.
1. ATM (Automated Teller Machine) 🏧
A little known fact about ATM’s is that around 95% of them run on Windows XP. This already leaves them vulnerable to a wide variety of hacks and security threats that have been developed for XP, as it’s one of the most popular operating systems in the world. But the bigger problems is that Microsoft ended support for XP in early 2014. This means that they’ll no longer be issuing security fixes foe new exploits, leaving those still using the operating system (Windows-XP) vulnerable. Because so many banks still use windows XP it takes huge investment and a large amount of time to upgrade the machines. In the mean tine, this leaves ATMs open to a number of hacking exploits that include stealing banking information and allowing the cloning of credit cards.
If this was helpful and Educational…Share this with the people you care about…U can educate people..!! ^_^
If u liked this… Like and Share… ^_^