The electronic devices most can be hacked

In recent years, connected to the network equipment is increasing fast, from smart TV to all sorts of intelligent household equipment, then to wearable motion tracking devices, smart watches, and unmanned aerial vehicle (UAV). However, many of the devices are vulnerable to hackers. Here to take stock of what’s most likely to be black seven categories of consumer devices.

Electronic Hacks - The degital devices can be hacked easily

Tablet

Pulse Secure the safety report, 97% of the malware to Android devices. Due to the application to control more strictly, and can quickly push comprehensive security updates, Apple’s iOS is more security than Android. Due to by manufacturers, the Android security updates are pushed slowly. Tablet PCs are also facing greater risks. Insiders pointed out some way to use your tablet like a notebook, often contain sensitive information related to the work of the document, but the Tablet PC did not get the same security with laptop, especially in the BYOD (Bring Your Own Device) environment.

Smartphone

For hackers, the smart phone is a valuable target. They can remotely invade smart phones to access variour types of information inside, such as social media and electricity supplier account, mobile banking authentication information, messages, photos, videos, location data and so on. Insiders pointed out that the operating system and user behavior are two factors that affect the safety of mobile phones. In addition, the popularization of blue tooth accessories in recent years, the also make smart phones more vulnerable to attack. Some of the equipment such as “1234” is very simple default Bluetooth pairing password. Moreover, Bluetooth connectivity verification is only once, after the paired, device is regarded as credible.

Unmanned Aerial Vehicle (UAV)

As the unmanned aerial vehicle (uav) is becoming more and more popular, its appeal will be increased for hackers. An attacker can use loopholes steal the uav itself directly, or theft of unmanned aerial vehicle (uav) distribution package. Hackers are able to connect WiFi uav remote invasion. For example, the security company Planet Zuda researchers at Def Conconference this summer demonstrated how how to invade the well-known brands of the Parrot drone products.

Children Equipment

Child-oriented networking equipment can allow an attacker to lock bothchildren and parents. Many children use the parents’ email address its toys and equipment to access control applications. If the child mobile applications are infected, hackers can get their parents’ data. Toys can be remotely controlled by mobile applications include Sphero of BB-8 Droid. Security company Bastille Networks, founder and chief technology officer Chris lu LAN (Chris Rouland) said that security risks exist not only in the communication protocol between mobile phones and BB-8, which is also at risk toy firmware modified.

Monitoring Equipment Category

This year, baby monitor, Nanny Monitor, and other similar equipment is the invasion of cases frequently hit the newspapers. Any networking equipment with a camera there is the risk of invasion. This fall, after the security company Rapid7 of popular baby monitors from six manufacturers for evaluation found that all of them there is a serious security problem, such as there is no communication data or stored encrypted. Rapid7 warned that this may just be the tip of the iceberg. An attacker could use such equipment invasion of privacy, theft of recorded video, tracking people at home, or use them to enter the local network.

Motion Tracking Devices

According to Intel the security sector • Bruce Snell (Bruce Snell), said the success of hacker intrusion motion tracking devices not only have access to a user’s personal information, Also may use the equipment into its connection of Smartphone, tablet, PC and home network. In addition, in October, the security firm Fortinet researchers said using blue tooth connection can invade the Fitbit sport bracelet. However, Fitbit counters that although the attacker can send Fitbit data and get the response, but the process has nothing to do with security holes, they are unable to send the data to the computers connected to the equipment, also cannot use software vulnerabilities to spread malicious programs.

Smart Watches

Earlier this year, after the 10 popular smart watches tested, HP found that they all have serious security problems. For example, half of them have no locking mechanism such as password authentication. Many are upgrading their security push, there are problems on authentication and data encryption. Their applications have security problems, resulting in the risk of privacy violations. Once able to invade the Smart Watch, hackers may also be able to invade paired mobile device and network it is connected.

#

No responses yet

Leave a Reply