Sunday Mirror

Gadgets that can be used to spy on you

-

A printer connected to a wireless network could offer hackers direct access to your computers, smartphone­s and tablets – in other words, the keys to your precious private and financial data.

Wireless printing works by using a network signal to send data packets (informatio­n) on a single frequency, using a network transceive­r built into the machine.

And anyone in the vicinity will be within range of the printer’s network traffic.

If the printer’s network connection is not secure, it gives online hackers a chance to intercept a document, such as a bank statement, or access your computer’s local documents, saved browser account log-ins or internet history, leaving you open to fraud.

You can reduce the risk by enabling WPA (wifi-protected access), which will encrypt the network’s access.

“Cars can open the door to threats that have long existed in PCs and smartphone­s,” Denis warned. “The owners could find their passwords being stolen – meaning hackers would have easy access to the location of the vehicle, and could worryingly take control of the steering wheel or brakes and unlock the doors remotely.

“In 2015, hackers meddled with the controls of a Jeep Cherokee, bringing it to a standstill while it was being driven, all from a digital device.” After the incident, Jeep’s owner said it was grateful the issue had been highlighte­d and updated car security. Smart coffee machines can be controlled via wifi by an app from anywhere in the home, meaning you can wake up to the smell of a fresh brew. But as soon as you connect online, if the password is not secure all your data is at risk. Kaspersky’s Denis Makrushin explained: “The coffee maker we examined during our experiment­s was sending unencrypte­d informatio­n. There was enough data there for an attacker to discover the password for the owner’s entire network.” Denis said: “Security expert Matt Jakubowski last year said he was able to extract the wifi network name, internal MAC address, account IDs and MP3 files from Mattel’s interactiv­e Hello Barbie dolls (right). This could be enough to gain access to the Hello Barbie account and the home network, and risks compromisi­ng the family’s wider security.” ToyTalk – which creates software for the dolls – insisted at the time that it was an “enthusiast­ic researcher” and “no major security” had been compromise­d. The My Friend Cayla doll, a popular present, encourages kids to talk to her and “discuss photos” with her online and offline using bluetooth. But last year, security researcher Ken Munro, from Pen Test Partners, was able to hack a doll and make her say what he wanted. Makers Vivid Toy Group said it was an isolated case by an expert, but added they were taking security “very seriously”. Smartphone location services If you have an iPhone, try this: click on settings, then privacy, then location services, system services and frequent locations. You’ll see a list of the cities you’re in regularly.

Click on any specific city, and you’ll find your phone knows locations you visit.

If you use Android, Google also keeps copious notes on locations. Snapchat Snapchat built its reputation on pictures that quickly vanish. But not everything goes for ever. Small print automatica­lly enrols users in their Memories service, which can store pictures. And they keep the right to do what they like with them. WhatsApp

 ??  ?? INTERNETCO­NNECTED CARS CHILDREN’S DOLLS
INTERNETCO­NNECTED CARS CHILDREN’S DOLLS
 ??  ?? COFFEE MACHINES
COFFEE MACHINES
 ??  ??

Newspapers in English

Newspapers from United Kingdom