Wednesday, January 7, 2015

WHAT CAN HACK HACKERS

The list of things that can be cracked by hackers. Objects hacker attacks are not only computers and phones, but also the device that is connected directly to the Internet. In this area fall risk devices such as ... TV 


Amazing.  What can hack hackers (8 photos)


Most modern TVs are no longer a simple device that receives the video signal via cable or satellite. Modern TVs can be connected to the Internet, allowing them to gain access to a variety of applications and services. Research conducted by a number of computer security experts have shown that the "smart" TVs are just as vulnerable to hackers, as smart phones and computers. Malicious code can be inserted in them using Skype, as well as through social networking sites such as Twitter and Facebook. After that, a "smart" TV can be used as part of a botnet, or a hacker can use the built-in TV cameras to spy on people. Another company involved in computer security, gave details of how to use some TVs allows hackers to steal confidential user information stored in so-called cookies-files. To obtain this data, the hacker would just be within the radio device. A special exploit also allowed hackers to download the TV your personal files. Printers
Amazing.  What can hack hackers (8 photos)

Many researchers have found ways to hack printers. Using certain vulnerabilities, they were able to introduce malicious code into the printer's firmware, and thus take him under their control.Using exploits became possible because many modern printers today use technology Wi-Fi, so that people can print your documents wirelessly. Researchers believe that gaining control of printers, they are able to perform a variety of actions, until the destruction of the printer. Some printers are equipped with thermal chips, which turn off the printer when overheated. This helps improve the fire safety of these devices. An attacker can repeatedly cause the printer to overheat, as long as it does not burn completely. Other threats are related to the fact that hackers have the ability to steal information that is printed on the printer. Also do not forget that the malicious code in the firmware of the printer is very difficult to remove because the traditional anti-virus software, in this case does not work. Car keys to unlock doors or start the engine, many modern vehicles do not need a physical key. To do all this, the driver enough to have a key e. Car reads the signal from the electronic key, after which it will be possible to open the doors and start the engine. There are many ways in which hackers cheat cars, causing them to "think" that they have a genuine electronic key. One such method is a rough selection of the six-digit code by sorting machine, which is also known as «bruteforce». A more sophisticated approach involves the use of two antennas near a vehicle to enhance the key signal so that the machine has decided that it is the "home" key. Another method involves the use of "clean" key and inexpensive set of equipment to intercept signals from genuine key. The resulting interception data may be used by an attacker to manufacture a duplicate electronic key. ATMs A little known fact about ATMs: about 95% of them are running Windows XP. This alone makes them vulnerable to a wide range of hacker attacks, specifically designed for this operating system, which even today is one of the most popular in the world. But the more serious problem lies in the fact that Microsoft has discontinued support for the system at the beginning of this year. This means that the system will no longer receive security updates, which eliminated the discovered vulnerabilities. As a result, those who still uses this system will eventually become very vulnerable. Nevertheless, a lot of banks around the world continue to use ATMs Windows XP, because the transition to another system requires huge investments in new ATMs, and in the new system. As a result, many ATMs are a tasty morsel for hackers who can steal banking information, and may also engage in cloning credit cards. Refrigerators In 2013, the California-based security company Proofpoint has identified a vulnerability in the global household appliances. The strange thing is that this vulnerability had been exposed to the devices we use every day - refrigerators. At least, most new "smart" refrigerators, allowing their owners to remotely monitor the temperature, keep food in a certain order, and run a variety of useful applications. Smart refrigerators can be broken, because the vast majority of owners leave passwords on these devices as they were in default, or because the safety functions of the refrigerator is not configured properly. The thing is that people simply do not perceive refrigerators as devices that could have been hacked. Meanwhile, hackers have used a refrigerator in their botnets and use them to send spam, what the owners of these devices do not even know, because compromised refrigerators continue to work normally. Automotive brakesin the car for business-critical functions are increasingly used not mechanical and the electrical system. More and more car manufacturers use electric brakes, rather than the traditional.Researchers from the University of California and the University of Washington could use weaknesses in computer systems onboard vehicles to take control of the brakes of these machines. As a result, the researchers were able to use the brakes as they please, they can even selectively apply the brakes on different wheels, and in this way to control the car. The researchers also demonstrated how you can completely disable the brakes, leaving the driver no single way to stop the car. Traffic Experiments conducted by researchers showed that the lights can be hacked remotely. An attacker could change the sensor readings on the road, forcing them to pass on false information. When road sensors reported traffic lights, the road clogged, signal lights automatically adjust its mode so that pass through the intersection as much as possible machines. On road sensors not provided any data encryption, which makes it possible to change any information that comes from these centers for traffic management. Another hack uses a different function of modern traffic lights. This feature allows emergency vehicles and "soon" to pass through the intersection faster than others. Signals of such machines on the road lights to come from special sensors, and these signals are encrypted. However, hackers still can get access to some of the old system, and change the traffic lights as they please. Medical implantsMillions of people around the world depend on medical implants that support their health. With the development of high technology, these devices have become more innovative. For example, the pacemaker can now be controlled with the help of special panels, which make it possible to change the parameters of these devices without surgery. Alarmingly, these implants are very poorly protected. A number of researchers says that the implants have a number of security vulnerabilities because they use radio waves and other wireless signals for communication between remote control, computer and the implant, and hackers may well use this vulnerability to take complete control of an implant. Researchers are able to disable replication pacemakers by radio, and were able to change the regime, according to which the other implant filed insulin into the patient. Both of these cases can cause serious health problems, and even lead to death.Experts continue to insist that it is necessary to take urgent measures to ensure the safety of medical implants.



Amazing.  What can hack hackers (8 photos)





Amazing.  What can hack hackers (8 photos)





Amazing.  What can hack hackers (8 photos)





Amazing.  What can hack hackers (8 photos)





Amazing.  What can hack hackers (8 photos)





Amazing.  What can hack hackers (8 photos)

No comments:

Post a Comment