In last few months hackers did lot’s of things and because of those things peoples were too disturbed or you can say people faced so many big problems. Whether it’s WannaCry ransomware incident or petya ransomware or Judy malware etc malware’s made peoples to face lots of problems in last few months.
Hackers getting smart day by day they found new ways to hack peoples devices and data. Therefore today we are going to tell you some 3 everyday things hackers can use to hack your data.
Let’s start with no 3:
Smartwatches invented to help you in navigation, to make a call to your friends or family member and to track your exercise activity. But according to the security researchers, hackers can use this device to get your ATM pin or hackers can get an access to your ATM just by your hand movements. Because in smartwatches sensors were embedded which tracks the user movement. Therefore hackers who access a device sensor data can figure out your ATM pin based on how the user’s move their hands. Hackers can also install malware in smartwatches to spy on the sensor’s data.
I know you are getting confused and maybe thinking that how can hackers use refrigerators to hack data. But my friend it’s true because one digital security company has proved that this can happen in real life. According to that company, smart refrigerators have built in tablet and computer which allows you to view calendar, play music, watch videos etc. But apart from these facility hackers can use refrigerator internet connection facility to send malicious emails to unsuspecting recipients. A company has also discovered that in between December 23, 2013, and January 6, 2014, hackers hacked 100,000 smart household appliances, including at least one refrigerator.
1. Tedd Bear:
Nowadays Toy Companies are producing smart toys with sensors embedded. And those sensors are able to transmit all type of data from recording audio to play audio. In international cyber security conference which held in the Netherlands, an 11-year-old programmer showed the audience how to hack a smart teddy bear. Using a single-board computer, the precocious programmer scanned for nearby Bluetooth devices to hack into audience members’ phones. He then hacked into the teddy bear and used it to record and play an audio message.
So, these are some 3 common and daily use objects that hackers can use to hack your data. Leave a comment to know us what you think about this.