Top 7 unusual objects of hacker attacks

Developed technologies carry both benefit to consumers and harm, in case of hacking. This is a problem that will only get worse in the future, because many companies underestimate or completely ignore cybersecurity. Any thing that has a microchip can be susceptible to hacking.

Here are 7 unusual things that can be hacked by hackers.

Contents:

  • 7.

    implants.

  • implants. 6.
  • toilets. 5.
  • alarm system. 4. "Smart" houses.
  • . 3.
  • aircraft. 2.
  • vehicle. 1. New

computer. 7.

implants. Any medical device located in humanbody and connected to the Internet, is vulnerable to hackers. In 2011, at the Black Hat computer security event, researcher Jerome Radcliffe demonstrated the vulnerability of his insulin pump by hacking it. He could raise or lower the dose of insulin to a dangerous or even lethal level, and the device would not warn the user about it.

6. Toilets

From hackers can not be saved, even in the restroom. This applies to those in whose homes a Japanese toilet innovation called Satis is installed. To control these "smart" toilets is the application for a smartphone called My Satis. It uses a single PIN for Bluetooth communication with each toilet. What can an attacker who hack into My Satis, annoy the user? For example, to force the toilet to constantly flush the water, and this is an additional cost when paying for the meter. And also turn on the air purifier, close and lower the lid of the toilet, and do not turn off the built-in sound module that "covers" the sounds of emptying the bowels.

5.

Alert System Another unusual thing that can be hacked by hackers. In 2014, the alert system in Montana warned viewers that "the dead appear from the graves and attack the living."Subsequently, the channel apologized to the townspeople, explaining that the message appeared as a result of hacking the alarm system. Similar pranks have occurred in other US states, one of them during the broadcast of the children's show "Barney and Friends".And although the entertainment of "computer pests" did not cause harm to anyone, this does not mean that subsequent alerts will be just as harmless.

4. Smart home

In 2015, an experiment was conducted in the West on the vulnerability of smart home automation devices. Of the 16 devices with burglary complexity, only one was delivered.

3.

aircraft To search for a hacker loophole in airplanes, one researcher purchased original spare parts from a supplier of aircraft equipment, in order to simulate the exchange of data between a passenger aircraft and an air traffic controller. He showed that the safety of aircraft is so weak that a mobile device with a self-made application can access various aircraft systems. Terrorists do not even need to carry weapons on board the airliner, if you can take control of the steering and send the winged car to the desired goal.

2. Vehicle

In 2015, researchers used the "zero day zero exploit", designed for the Jeep Cherokee and received wireless auto control. The jeep driver, the reporter who participated in the experiment, rode along the track at a speed of 115 kilometers per hour, when the experiment's authors set the cooling to maximum, changed the radio station, turned on the windshield wiper and displayed the message "You are doomed!" To the digital display. The driver tried to manually stop these disgraces, but without success. Although he knew in advance what would happen, but still experienced several unpleasant minutes. Researchers warn that these are only "flowers".They could suddenly stop the car, which would lead to an accident.

1. The new computer

A new computer, not connected to the Internet, takes the first line of high-tech things vulnerable to hacker attacks. Some Chinese PCs were sold with a pre-installed virus, spying on users and hindering the work of antivirus software. Microsoft's investigation revealed that computers were infected with Nitol malware. It spread through removable media and managed to infect millions of computers throughout China.