It’s scary how many things in your house can be hacked ( Here are six surprisingly vulnerable appliances and utilities that are rife for hack attacks)

Donald Trump may think he’s wreaking havoc when he tells the Russians to hack into Hillary Clinton’s
e-mail, but America’s vulnerabilities go way beyond the Democratic presidential candidate’s missives.

 Here are six surprisingly vulnerable appliances and utilities that are rife for hack attacks.

1. Your car

Considering that modern cars are essentially rolling computers, it’s not too surprising that the FBI recently released a warning that “consumers and manufacturers maintain awareness of potential cyber security threats.”  every modern car has an internal network that, if tampered with correctly can cause a car to “lose power steering, lose power control [and] set off every alarm.” Additionally, hackers getting into your bluetooth might be able to ransack your contacts.

2. Your refrigerator

 A smart refrigerator that has been built to download Google Gmail calendar information can be hacked in order to extract Google log-in codes. This was pulled off by a company called Pen Test Partners at a hacking challenge. Additionally, in 2014, another smart refrigerator was used to launch a spam attack.

3. Your child’s baby monitor

Probably the creepiest hack of all, this one has people watching babies sleeping and launching verbal gibes at them. This past January, the New York City Department of Consumer Affairs pointed out baby-monitor vulnerabilities without naming exactly what they are. “This is a situation where parents purchase a video monitor intending for it to give them peace of mind . . . and instead what we’re seeing is some terrifying instances of people hacking into them.”

4. Your self-aiming rifle

Chances are that you do not own a gun that costs $13,000 and turns whoever uses it into an instant sharpshooter. But if you do own one, the consequences can be way worse than having your Gmail password hacked. The gun has a Wi-Fi connection, runs on Linux. In other words, a hacker can control the gun so that its deadly accuracy takes out a target of the digital intruder’s choosing.

5. Your computer camera

The ultimate invasion of privacy might be somebody hacking into your computer, commandeering your camera and watching your every move.  it can be done via a technique called “clickjacking,” in which the “allow” button for using the camera is invisibly laid over an on-screen button you will be likely to click. It’s bad enough that, the FBI director James Comey says that he puts “a piece of tape over the camera.” No doubt, the couple that claims to have had their sexual activities captured by a hacked computer camera and posted online wish they had followed Comey’s lead.

6. Your printer

Everybody worries about their computers being hacked, but printers are vulnerable as well. Notorious hacker Andrew “Weev” Auernheimer capitalized on a number of printers hooked up to the Internet with insecure connections. Working remotely, he programmed them to spit out what appeared to be Nazi propaganda and boasted on Twitter, “I’m printing to a thousand printers an hour right now.”

Comments

Popular posts from this blog

Fidel Castro’s ashes interred in private ceremony

Trump shames Obama into visiting Louisiana’s victims

Internet Explorer users should read this