From televisions to passenger planes, even the most unassuming device can, if accessed by the wrong people, be turned into something more sinister. The issue of hacking is rarely out of the headlines, especially due to the recent spate of hackings targeting private photos of celebrities. The issue has become global news and sent the internet into a spin, whilst reminding us how vulnerable devices can be to hacking and that we can all become unsuspecting victims. WebHostingBuzz recently released an infographic detailing the scariest side of hacking, with surveillance, theft and crashes some of the most chilling scenarios.Commercial PlanesIOActive’s Ruben Santamarta said it was possible to hack satellite communications equipment on passenger jets through their Wi-Fi and inflight entertainment systems. Though his attack was only proven possible in a lab. He said an attacker could hack the plane’s avionics equipment and disrupt or change satellite communications, impact on the plane’s navigation and safety systems. Aviation experts disagree, calling such an attack impossible.Medical EquipmentIn 2012, the late Barnaby Jack discovered a way to subvert an implanted insulin pump to make it deliver 45 days’ worth of insulin in one go. Medical devices were never designed to be “hacker proof”, making them easy targets for those with malicious intent. However, thanks to Jack, medical devices are now becoming safer and more resistant to outside influence.Power PlantsResearch released by Automatak in 2013 exposed 25 vulnerabilities in power plants across the U.S. and Canada. At the time, the flaws exposed substations, water utilities, and power stations to attack. If exploited they could be used to crash or hijack the servers at these facilities. Baby MonitorsIn April 2014 an Ohio couple awoke to the sound of an unknown man shouting “wake up baby!” through their wireless baby monitor. The Internet-enabled monitors allow parents to watch over their children remotely, through their smartphone or an Internet browser. Devices such as this, and the security risks they pose, are generalized under Internet of Things, or IoT.DronesThe Iranian military claimed responsibility for the 2011 crash-landing of an America drone, by sending it fake GPS signals. The U.S. military, as well as various security experts, however, dispute this claim. The accepted theory is that the crash was caused by a routine malfunction. Prison Cell DoorsAt DEF CON in 2011, researcher John Strauchs showed how it is possible to open every cell door in a prison at once by hacking into an industrial programmable logic controller. The same method was used a year earlier at an Iranian nuclear facility.ATMsIn June 2014, two Canadian schoolboys hacked Bank of Montreal ATMs, before highlighting the security risk to the bank. Basic security failures, such as weak passwords, configuration problems and archaic standards can leave ATMs vulnerable to hacks.PhotosAugust 2014 saw a major violation of privacy when a hacker posted nude images of female celebrities online, thought to have been stolen from celebrities’ backup services, such as iCloud. The hacker listed more than 100 names, claiming to have intimate photos of many of them before posting much of them online, sparking an FBI investigation.Voice MailIn July, British tabloid News of the World was shut down after “the phone hacking scandal.” Investigations discovered that over several years the newspaper hacked the phones of celebrities, royaly and murder victims, among others, and accessed their voicemails. The scandal sparked the Leveson Inquiry, a judicial public inquiry into the British media.ToysResearcher Jennifer Savage used her daughter’s Wi-Fi connected plastic bunny to demonstrate how toys can be hacked. The hacked Karotz toy played scary music and the camera was used as a spying device.VehiclesMany modern cars contain upwards of 50 electronic control units, which can allow someone to unlock and start the vehicle by sending a text. Not all cars can be hacked, but there is a growing effort to better secure the onboard controls, because some of them do have legitimate flaws. AppliancesIn 2012, German researchers used “smart” electric meters to obtain information on when residents were awake, asleep, not at home and what they were watching on TV.HotelsSecurity consultant Jesus Molina revealed that he used an in-room iPad to gain control over lights, temperature and blinds in 200 hotel rooms at the St. Regis Hotel in Shenzhen, China, in the summer of 2014.Smart TVsSamsung came under criticism when it was shown that their “smart” televisions’ Facebook app could be tweaked to spy on the set’s owners. The limited amount of built-in security possesed by these televisions leave many vulnerable to hackers. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe