- Mommy why are all the
traffic lights green? And now red? And now green? Yep, believe it or not, many of the things that you use every
single day can be hacked. Things that you would not think of or that you would think
would be completely secure can actually be tampered with by a hacker. And these are things that you should hope that never actually get hacked
because well, you'll see why. Here are 10 things you
didn't know can be hacked. Number 10 are ATMs. In the movies it seems pretty simple to hack an automated teller and get as much money as you would like, but here in the real world
that's impossible, right? Well it turns out that if you possess the level of cyber hacking skill required, you can make that Hollywood
simplicity a reality and get a decent payday for your trouble. Over the course of 2018, researchers from Positive Technologies an information security consulting firm discovered the numerous vulnerabilities in several different models of ATMs. Using software based attacks
on 26 separate machines, the researchers managed to gain access to the card data of customers
in every single one of them. And around 85% of the ATMs hacked, resulted in free cash being obtained. Well, it gives a whole new
meaning to making it rain. Just... Oh look at that, I can pay my bills now. Number nine is a laptop battery. When it comes to hacking into a laptop, the hard drive isn't always the target. In fact, the target could be arguably and unexpectedly the battery. In August of 2011, Charlie Miller the researcher with Accuvant LABS revealed that certain MacBook batteries were susceptible to cyber attacks. They can be made to overheat or even potentially start a
fire through over-charging by falsely telling the devices controller that it's empty of power. The hackers can get full control of the batteries
microprocessor and break it, essentially turning the power
source into a paperweight. While that sounds easy to fix by simply getting a new battery,
it's often quite difficult as many new MacBook Pros and MacBook Airs contain batteries that cannot
be accessed by their users and thus cannot be
swapped out for a new one. So the next time you feel
the bottom of your MacBook and it's like "Oh this getting hot," you might be getting hacked. Number eight are baby monitors. (imitating baby talking) Imagine waking up in
the middle of the night to hear a random voice in
your child's room saying, "Hello, how is everyone?" Yeah that's pretty much a
nightmare for every parent. Well, believe it or not with
the rise of smart technology, this nightmare is becoming a reality. Only, there's nobody else in the house, just a skilled hacker who's gained access to the baby monitors. This was the case for
Ellen and Nathan Rigney, a couple in Harris County, Texas, who one night in December of 2018 woke to a man's voice coming
through their baby monitor saying that he was going
to kidnap their child. The hacker had gained
access through the app which normally allowed users
to check in on their child through their smartphone
while at work or on the go. Luckily of course, everyone was okay, but it's scary to think that it's that easy to
prey on a parent's fears. Hey, I see what you're doing there. Put that lollipop down. You know that's full of
calories, I'm coming for ya. (laughs) Number seven are traffic lights. It turns out that the devices
used to keep people safe and help reduce traffic congestion can believe it or not, be
made to do the exact opposite. In 2014, researchers at
the University of Michigan discovered that by taking advantage of a lack of network security and vulnerable traffic sensors
which managed traffic lights in many cities across North America, they could give themselves
an easy drive to work. That's right, a person
in a car with a laptop and a wireless card to
get onto the internet can access the often unencrypted networks that control the lights ahead of them. This essentially allows them to make every single light green while frustrating cross traffic
with nothing but red lights. But a malicious individual
with similar access can do far worse creating
colossal traffic jams or even causing potentially car accidents. You've seen those bank job movies. Oh, green light (laughs),
red light (laughs), green light, people need a hobby. Number six are toilets. Yep, that's right, where
you drop off your dookie. Every device in the home from the thermostat to the
refrigerator is becoming smart and the seemingly
ageless, porcelain throne is not immune to the change. The problem is with a
big technological upgrade comes the potential for cyber attacks from malicious individuals. In early August of 2013,
a pair of researchers working for a tech security
company known as Trustwave discovered that a number of smart toilets were susceptible to the whims of hackers. That's right, your greatest
place of peace is now hackable. The My Satis smart toilet which is made by a company
in Japan called LIXIL could be accessed via Bluetooth and made to spray a person with the boday or let out a screaming sound. Imagine you dropping
off the kids at the pool and all of a sudden you
hear screaming from below. (screaming) The toilets can even be forced
open and close their lids causing what the team called
discomfort or distress to those who were in
the process of using it. Ah, the toilets being closed. Ah, the toilets being closed,
why is this happening? Number five are cars. In the summer of 2015, Andy Greenberg a senior
writer for WIRED magazine was covering a story about
Charlie Miller and Chris Valasek, two automotive security
experts in downtown St. Louis. For the story, the pair hacked
into a Chrysler Jeep Cherokee and the crazy thing is that Greenberg was driving down the highway from over 16 kilometers
away to make it happen. They managed to make adjustments to the climate control system, change the radio station volume, turn on the windshield
wipers and even put a picture of themselves on the dashboard display. Oh, and all of that before
all together killing the car by the cutting the vehicles transmission. These are only a handful
of things a decent hacker can do to a number of different vehicles as horns, brakes, seat belts and even steering wheels
can be remotely controlled. And that could obviously lead to you know, what do they call that? A terrible situation. Number four are orbiting satellite. According to the UN's Office
for Outer Space Affairs, yes, that is a real thing,
at the start of 2019, there were 4,987
satellites orbiting earth. Most of them are no longer in use and many of them are
susceptible to cyber attacks. Once in the hackers control, these satellites could be disabled, made to send false information such as the wrong GPS coordinates or even forced to shift
position causing them to collide with other satellites
or come crashing down. Now, hackers will often
target the older models, obsolete ones that have been left in orbit because it's more
expensive to take them down than to just leave them up. But these devices possess
severely outdated security which could allow a cyber attacker to gain access to their computer system. They may no longer be in use but they could still cause a
devastating amount of damage. So remember that next time
you ask the GPS where to go and it's like, "Turn left into lake, now. "Do it, drive." Number three are entire cities. Everyone seems to be jumping
on the smart bandwagon these days and major city
infrastructures are no different. According to Cesar Cerrudo who's the chief technology
officer at IOActive, a Seattle based security firm, not only are hundreds of
cities across the United States overly dependent on smart city technology, but since the security of these devices has really never been tested, they're severely vulnerable
to attacks from hackers. That's right, some cities
are just a few key strokes from one person taking
out every street light along a busy road as the system sensors are tricked into reading
that it's day time. Or imagine shutting off an
entire town's electricity all together by hacking
into the local power plant. It's even possible to have
a major city subway system wrongfully read that trains are delayed which can lead to deadly crashes. Okay, based on all of this, I'm just gonna start walking
everywhere, it's just too much. Number two are vital sign. Sometimes hackers are
responsible for hurting people by taking away access to things, stealing data or emptying
their bank accounts, but it's actually
possible to take something even more important away from someone. Their life. In 2018, a group of
researchers showed a crowd at the security convention
DEF CON in Las Vegas that it's possible to gain access to a number of medical devices that's used in hospitals
and doctors offices and shockingly that it
can be done in real time. The hackers could
provide false information to the monitors hooked up to the patient, altering the persons vital signs which can lead to the wrong
medication or treatment being chosen or too much of
either being given to them. Imagine shocking a patient to
stop them from flat lining, only to find out that
they were totally fine in the first place. Hey, hey doctor, yeah, no
heart attack over here. No heart attack over here, why do that? And number one are medical implants. It turns out that there's
a large number of ways a skilled hacker can do
serious damage to someone, especially those who rely
on machines to survive. In early August of 2018, a group of professional
hackers revealed to a crowd at the 21st annual Black Hat convention, just how easy it is to access
a number of medical devices including ones that are
implanted in your body. These devices include pacemakers which could be hacked to either deliver a deadly electrical
shock to the individual or deny a shock when it's
urgently needed to save their life or even insulin pumps which
could be compromised to skip a scheduled dose of the life-saving
medication to diabetics. That's right, just a
few clicks to a keyboard and a person's heart could literally stop or while you're watching a YouTube video, I could shut your stuff
down, (laughs) click.