Breakthrough now not only threatens computers and smart phones, but a set of technologies and devices that you use in your home can be vulnerable to penetration. In this post we will identify the six consumer devices used in your home can hacker penetrate.
1. Refrigerators
Home refrigerators are simply cooled food and drinks, but smart refrigerators have been developed and incorporated into tablet PCs to allow you to view calendar, play music, watch videos and even make purchases online. Future smart refrigerators can also identify the food and drinks inside, and automatically alert you to the need to buy missing items. These functions can make everyday life a little easier, but you have to be very careful with such devices.
A digital security company discovered that two weeks ago, between 23 December 2013 and 6 January 2014, cybercriminals hacked 100,000 smart home appliances, including refrigerators. They even used the Internet connection of these refrigerators to send malicious messages to others!
2. LEDs
Hackers can connect to various devices connected to the Internet and this is something known. But smart lights are particularly vulnerable to piracy, as researchers from Israel and Canada discovered last year. Hackers may be able to remotely control these bulbs remotely, such as turning them on or off, and changing the light level.
3. Printers
Just like computers and smart phones, some printers come with Wi-Fi connectivity, which makes them a victim of hackers. After hackers can break through the printer, they can see what is being printed on the device, and the computer with which the printer is connected may be attacked. In February 2017, a hacker wrote automated text to manage more than 160,000 printers connected to the Internet without a firewall. Although he can print threatening messages or steal confidential data from these printers, he only prints the messages shown in the following picture:
4. Games
Some toy companies, which produce smart dolls equipped with sensors that transmit all kinds of data, from sound recordings to all vital indicators of the child. Earlier this year, pirates had access to 800,000 client accounts using such games, which could threaten the confidentiality of sound records stored in their system.
5. GPS device
Regardless of whether is an independent device or built-in car, GPS can greatly reduce the time of the person when traveling. But hackers can penetrate the GPS on the phone or in the car to track the owner's location, send a person to a dangerous place or even cause an accident. Using a GPS simulator, hackers can also rig coordinates to change location data.
6. Cars
In 2015, two security researchers were able to penetrate and control the Jeep, while Charlie Miller and Chris Falasik managed to control the radio, windshield wipers and air conditioning in the car. Furthermore, the researchers also managed to change the car's speed, brake and track movement with the GPS.