SlideShare uma empresa Scribd logo
1 de 8
The Most Unexpected and Scariest -
Things with Potential to be Hacked
Here is the list of the most unexpected things with potential to be hacked.
Power Plants
 According to a Power Plants research report released in 2013, power plants across
the United States and Canada exhibited flaws leaving them exposed to hacking.
 If hacked, the power plants could be used to hijack the servers that control power
plants, water utilities, and electronic substations.
Cell Doors of Prison
 A study has shown that there exist a possibility to open every cell door in prison at
a time by infiltrating an industrial programmable logic controller.
 The same technique was used at an Iranian nuclear facility in 2010.
Satellites
 In 2008, the United States alleged that China-based hackers had intercepted two
U.S. satellites, taking control over Terr AM-1 and Lamdsat-7 for about 12 minutes.
Samsung Smart Televisions
 Televisions hacked? It seems far fetched thought even in imagination.
 But sometime back, Samsung can under the criticism radar when its “smart” TV's
Facebook application could be adjusted to snoop on the television's owners.
 Considering the in-built security of these televisions is limited, it is possible they are
prone to hacks.
Commercial Air Planes
 According to a cyber security report, it is possible to hijack satellite communications
device on commercial planes via their inflight entertainment and Wi-Fi systems.
 This technique allows anyone to compromise the jet's avionics equipment,
disrupting or altering satellite communications, and affect the plane's security and
navigation systems.
Photographs
 It is what considered to be one of major breaches of security and privacy in recent
times, a hacker posted inappropriate photos of female celebrities on the Web in
August 2014.
 These photos are believed to have been stolen from the celebrities' mobile backup
services.
 The hacker claimed to have inappropriate photos of more than 100 celebrities
before posting a majority online.
Baby Monitors
 In April 2014, a Ohio-based couple were in for a rude shock when they woke
startled to the sound of a stranger shouting “wake up” at their baby via their
wireless baby monitor.
 The man was just screaming at the 10-month-old baby girl trying to wake her up,
before the father unplugged the device. The camera was found to be hacked from
outside.
 These Web-enabled monitors let parents keep a constant eye on their children via a
Web browser or mobile.
 Security experts have warned wireless cameras such as this are prone to hacks.
Voice Mail
 In July 2011, leading British newspaper News of the World ended its publication
after 168 years of printing following 'the phone hacking scandal.
 Investigations revealed that the tabloid, for several years, hacked phones of
celebrities and murder victims, accessing their voice mails.
 This sparked a huge scandal resulting in the shut down of the daily.
Medical Equipments
 A medical research report released in 2012 revealed a way to destabilize an
implanted insulin pump making it deliver a lethal dose in one shot.
 The study also reported once hackers access medical devices they can remotely:
• Stop a pacemaker;
• Send random shocks to a patient via a bluetooth-enabled defibrillator;
• Access X-rays;
• Change the temperature settings on refrigerators that store drugs and blood; and
• Alter digital medical records resulting in misdiagnosis.
Appliances
 In 2012, German researchers revealed that most of the 'smart' appliances found in
home are vulnerable to cyber criminals.
 Hackers can use the 'smart' devices (e.g., electric meters) to get details on residents
when they are awake, watching TV, sleeping, and not at home.
Hotels
 With the any electronic device (e.g., iPad), hackers can get control temperature,
lights, and blinds, say Hotel security experts.
Cars
 Today's modern cars come around with 50 electronic control units build-in. These
units can allow anyone to unlock and start the automobile via a text.
For More Information About Hackers Updates.
Click: https://blog.instantssl.com/

Mais conteúdo relacionado

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Destaque

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destaque (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

The Most Unexpected and Scariest Things with Potential to be Hacked

  • 1. The Most Unexpected and Scariest - Things with Potential to be Hacked
  • 2. Here is the list of the most unexpected things with potential to be hacked. Power Plants  According to a Power Plants research report released in 2013, power plants across the United States and Canada exhibited flaws leaving them exposed to hacking.  If hacked, the power plants could be used to hijack the servers that control power plants, water utilities, and electronic substations. Cell Doors of Prison  A study has shown that there exist a possibility to open every cell door in prison at a time by infiltrating an industrial programmable logic controller.  The same technique was used at an Iranian nuclear facility in 2010.
  • 3. Satellites  In 2008, the United States alleged that China-based hackers had intercepted two U.S. satellites, taking control over Terr AM-1 and Lamdsat-7 for about 12 minutes. Samsung Smart Televisions  Televisions hacked? It seems far fetched thought even in imagination.  But sometime back, Samsung can under the criticism radar when its “smart” TV's Facebook application could be adjusted to snoop on the television's owners.  Considering the in-built security of these televisions is limited, it is possible they are prone to hacks.
  • 4. Commercial Air Planes  According to a cyber security report, it is possible to hijack satellite communications device on commercial planes via their inflight entertainment and Wi-Fi systems.  This technique allows anyone to compromise the jet's avionics equipment, disrupting or altering satellite communications, and affect the plane's security and navigation systems. Photographs  It is what considered to be one of major breaches of security and privacy in recent times, a hacker posted inappropriate photos of female celebrities on the Web in August 2014.  These photos are believed to have been stolen from the celebrities' mobile backup services.  The hacker claimed to have inappropriate photos of more than 100 celebrities before posting a majority online.
  • 5. Baby Monitors  In April 2014, a Ohio-based couple were in for a rude shock when they woke startled to the sound of a stranger shouting “wake up” at their baby via their wireless baby monitor.  The man was just screaming at the 10-month-old baby girl trying to wake her up, before the father unplugged the device. The camera was found to be hacked from outside.  These Web-enabled monitors let parents keep a constant eye on their children via a Web browser or mobile.  Security experts have warned wireless cameras such as this are prone to hacks. Voice Mail  In July 2011, leading British newspaper News of the World ended its publication after 168 years of printing following 'the phone hacking scandal.
  • 6.  Investigations revealed that the tabloid, for several years, hacked phones of celebrities and murder victims, accessing their voice mails.  This sparked a huge scandal resulting in the shut down of the daily. Medical Equipments  A medical research report released in 2012 revealed a way to destabilize an implanted insulin pump making it deliver a lethal dose in one shot.  The study also reported once hackers access medical devices they can remotely: • Stop a pacemaker; • Send random shocks to a patient via a bluetooth-enabled defibrillator; • Access X-rays; • Change the temperature settings on refrigerators that store drugs and blood; and • Alter digital medical records resulting in misdiagnosis.
  • 7. Appliances  In 2012, German researchers revealed that most of the 'smart' appliances found in home are vulnerable to cyber criminals.  Hackers can use the 'smart' devices (e.g., electric meters) to get details on residents when they are awake, watching TV, sleeping, and not at home. Hotels  With the any electronic device (e.g., iPad), hackers can get control temperature, lights, and blinds, say Hotel security experts. Cars  Today's modern cars come around with 50 electronic control units build-in. These units can allow anyone to unlock and start the automobile via a text.
  • 8. For More Information About Hackers Updates. Click: https://blog.instantssl.com/