Research from various security experts has shown that smartphone are even vulnerable to hack as computers and phones. They are connected to the internet allowing the access of Facebook, Skype, and Twitter which makes the smart television vulnerable to the malicious code. They can use the built-in cameras to spy on someone or use the television as a part of a botnet. The hackers can even steal sensitive information stored in cookies and also allow them to download files. To get these data a person have to simply within the radio range of the device.
With advancement in technology, electric toilets have also been possible. But this toilet has a problem discovered by the software security, Trustware, that many of them are controlled by the application that communicates via Bluetooth with toilet. These have hard-coded Bluetooth PIN codes allow access to anyone who installs the app. This would allow people to operate the toilet operation like opening and closing the lid and flushing constantly etc.
Some researchers believe that printers can cause self-destruction. Some thermal chips shut down the printers automatically if they reach at a particular temperature to avoid the risk of fire. Hackers can cause the printers to reach to that certain temperature by forcing the printer to person the action continuously.
- Car keys:
There are various ways in which hackers can trick cars into, thinking that they have genuine keys. One of the ways is instinctive force the six digits passcode that is used by some car manufacturers. As the passcode consists of numbers only, so they can do with freely available software.
95% of the ATMs run on Windows XP which makes them vulnerable to a variety of security threats and hack. Moreover, the problem becomes serious after Microsoft in 2014 ended support for XP, which means no security fixes for new exploits who are still using this version of Windows.
A security firm, the Proof print is based on California has thrown light on global exploits of home appliances. One of the appliances subjected to these exploits is smart fridges that can be hacked as the majority of the owners leave their passwords at default settings or don’t properly set security features. The hacker uses fridges in a botnet to send spam without the knowledge of the owner that malicious code has entered the device as it functions normally.
- Baby Monitors:
Baby monitors have also become the target of the hackers. Some monitors give a signal all time either for the password not set or left at default setting letting anyone within the range to access the audio and video.
- Car Brakes:
Researchers at University of Washington and University of California have been able to exploit the faults in onboard computer systems to take the control of the brakes on various cars. They also utilize the brakes as they want. According to a demonstration from hackers to Forbes Magazine an unscrupulous person can even shut down the brakes completely, leaving us a now to slow down our car.
- Traffic lights:
Traffic lights also get exploited in the hands of the hacker by altering the sensor on roads to display false information. Sensors are forced to report that a road is jammed, the traffic light adjusts the default schedules settings which allow the car to pass through the junction.
- Medical Implants:
Several of researchers have shown that Medical Implants are vulnerable to various security threats. The hacker uses radio waves and other wireless signals to connect with computers or remote signals to exploit the flaws and take over them.