7 Surprising Places Hackers Hide

The innocent items that might let hackers into your home or business.

learn more about Nina Zipkin

By Nina Zipkin

The internet of things has made everything from refrigerators to thermostats smarter. But as with connected technologies grow in popularity, malicious hackers can find ways to take advantage of these innovations, increasing the need for awareness and vigilance. While strengthening your passwords and utilizing other security applications can help, blocking access can be a great first step.

Off-brand apps

If you use certain third-party apps, be careful. This fall, Snapchat users were the victim of a major breach, with more than 90,000 photos and 9,000 videos stolen. Those users downloaded third-party apps to get around the fact that Snapchat wasn't offered on their operating system. According to Snapchat, some third party developers would build services to trick users and steal their login information.
Read more: 'The Snappening' Really Happened: 100,000 Snapchat Photos and Videos Leak Online

Your refrigerator

Last year, a security firm called Proofpoint, Inc. discovered a hack that occurred between December '13 to Jan. '14 used 100,000 interconnected household items (like smart fridges) as entry points to send virus-ridden e-mails.
Read more: Uh, Did Your Refrigerator Just Send Me an Internet Virus?

The car

A report was released this winter by the office of Senator Edward Market (D-Mass) that found that nearly 100 percent of cars have wireless weaknesses that hackers can use – everything from keyless entries, navigation systems and remote starts. Not only that, but personal information collected by car manufacturers are often stored with third parties that could be breached.
Read more: The Next Place Hackers Will Find You? Your Car.

Your social media accounts

Time and again, big-name news organizations and well-known companies are the victims of hacking via their social media accounts, especially Twitter. Chipotle, Newsweek are only the latest brands to have their social presence compromised.
Read more: Hackers Strike Newsweek's Twitter Account

At the cash register

Some of the most recent retail breaches – Target, Neiman Marcus, Michaels, P.F. Chang's and Home Depot, to name a few – have called into question the safety of point-of-sale systems and payment terminals that lead hackers to credit card information. If you use a mobile payment system, ensure that you are doing everything you can do cut down on the possibility of fraud.
Read more: Target, Neiman Marcus Credit Card Hacks Could Be More Widespread, Experts Say

Your baby monitor

If your baby monitor can run wirelessly, there's a chance that what you use to keep track of your little one can be used by hackers to keep track of you, especially if there if is a camera attached.
Read more: The Internet of Things: New Threats Emerge in a Connected World

Your fax machine

Yes, really -- even if you don't use it that often. Especially if you don't use it often. The research arm of the company Check Point Software was able to hack into every computer that was connected to an HP all-in-one printer by sending a fax with harmful code that was made to look like a normal image file. The fax stored the file in the system, which gave the hackers access to the whole system. So let that be a lesson: just because something isn't a part of your regular tech routine, make sure you do a frequent sweep. Or upgrade to a system that won't lay dormant and vulnerable to hackers.


Nina Zipkin

Entrepreneur Staff

Staff Writer. Covers leadership, media, technology and culture.

Nina Zipkin is a staff writer at Entrepreneur.com. She frequently covers leadership, media, tech, startups, culture and workplace trends.

Related Topics

Editor's Pick

The Dark Side of Pay Transparency — And What to Do If You Find Out You're Being Underpaid
Thinking of a Career Change? Here Are 4 Steps You Can Take to Get There.
A Founder Who Bootstrapped Her Jewelry Business With Just $1,000 Now Sees 7-Figure Revenue Because She Knew Something About Her Customers Nobody Else Did
Everything You Need to Know About Franchise Law
Business News

Book Thief Evades Prison Time and Will Pay $88,000 in Restitution

Filippo Bernardini pleaded guilty to stealing more than 1,000 unpublished manuscripts in an elaborate phishing scheme.

Employee Experience & Recruiting

Job Listing 101: Online Hiring Basics

A job listing is often the first interaction job seekers have with your company. Your business can ace online hiring by creating an effective job listing that attracts qualified candidates.

Business News

'A Serious Concern': Journalist Paints a Harrowing Picture of What's to Come With Twitter Blue After Her Account Is Cloned

Jacquelyn Melinek alleged that a Twitter account posing to be her copied all of her information — then blocked her.