What is Vulnerable?

cyber-security-graphicWhat is cyber security?
Much is 3
rd Party and out of your control!

Measures taken to keep unauthorized persons OUT and minimize attacks on such technology as:

  • COMMUNICATIONS (phones, emails, home Wi-Fi, computer)
  • ENTERTAINMENT ( MP3/4, digital cable)
  • TRANSPORTATION (cars, plane navigation, gas pump)
  • SHOPPING (online stores, restaurants, grocery)
  • MEDICAL (files, medical equipment, EMS)
  • WEARING APPAREL (shoes, monitors)
  • FINANCE (banks, credit cards, investments, ATM)
  • APPLIANCES (refrigerator, TV, coffee pot)
  • SECURITY SYSTEMS ( cameras, alarm systems)
  • UTILITIES (gas, electric, water)
  • TOYS (gaming systems, dolls)

SMALL LIST OF HACKABLE ITEMS

  • Car Stickers
  • Company Badges
  • Recordings
  • Drawings
  • Source Code
  • Hardware Software
  • Car Remote
  • Dolls
  • Video Files
  • Printers
  • Copiers
  • Fax Machines
  • Cash Register
  • Home Security
  • Airplanes
  • Televisions
  • Wireless Credit Cards
  • External/Portable Hard Drives
  • Wireless Hotel keys
  • Network Surveillance Cameras
  • Printers
  • Traffic Lights
  • Credit Cards
  • Bluetooth
  • Serial Ports
  • Sim Cards
  • Shoes- smart chip
  • Sex Toys
  • Gaming Devices
  • Downloaded Apps
  • Desktop, Laptop
  • Smartphones, Tablets
  • USB Flash Drives, SD
  • Memory Cards
  • DVD, CD-ROM’s
  • Fridges
  • Car Brakes
  • Corporate Badge
  • Car Keys
  • Toilets
  • Nanny Cam
  • Baby Cams- motion/sound trigger

 

Share and Enjoy

  • Facebook
  • Twitter
  • LinkedIn
  • Add to favorites
  • Email
  • RSS
  • Print
  • Google
  • Google Plus