Man makes toaster hack computer

Man makes toaster hack computer
Man makes toaster hack computer

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

Content-Transfer-Encoding: QUOTED-PRINTABLE

By Chandan Haygunde
December 13, 2007

Pune - Can you imagine a toaster hacking a computer? That=E2=80=99s true. In 
fact any kitchen appliance can be used for attacking your computer 
system, said Dror Shalev, a hacker from Israel, during the international 
convention of hackers =E2=80=98Clubhack 2007=E2=80=99 held recently.

In his demonstration at the convention, Shalev left the audience amazed 
by actually hacking a computer with a toaster. Shalev, who is a security 
expert at Check Point Software Technologies in Israel, was one of the 
foreign speakers at the international convention.

He said that any home device could be connected with a software 
prototype to hack a computer. =E2=80=9CI read a senior scientist from Google 
saying there was no need to be afraid of a toaster at home,=E2=80=9D Shalev told 
The Indian Express. =E2=80=9CBut as a hacker I came up with a toaster that could 
actually hack a computer. I call it a =E2=80=98Crazy Toaster=E2=80=99.=E2=80=9D

Simplifying the functions of =E2=80=98Crazy Toaster,=E2=80=99 Shavel said he developed a 
software and networked it with the toaster.

=E2=80=9CAs soon as the toaster is plugged, the software is activated before it 
breaks into the user=E2=80=99s computer system. The same software prototype can 
be networked with any home appliance for stealing the web secrets,=E2=80=9D he 
said. =E2=80=9CWith wireless technology available, there is no need for 
connecting the appliance with the computer.=E2=80=9D

Shalev said he just wanted to convey that one couldn=E2=80=99t blindly trust 
=E2=80=9Canything=E2=80=9D in the world of internet. =E2=80=9CAs the usage of computers and 
internet goes up, we will need to be cautious about every object in our 
surroundings,=E2=80=9D he said, suggesting people purchase home appliances of 
branded companies. =E2=80=9CIf an appliance or home device comes as a gift, 
accept it only if it is from someone you trust.=E2=80=9D

Shalev also said people should believe in ethical hackers like him, who 
were doing constructive work for security firms, and doing work just for 
the love of programming and not for money. =E2=80=9CHackers play a crucial role 
in developing a good product and save millions of dollars by ensuring 
that precious databases and information are not compromised.=E2=80=9D

Appreciating the initiative taken by the Indian hackers to organise 
Clubhack, he said such conventions should be arranged on regular basis. 
=E2=80=9CThe world is turning into a global village. But this village is not 
secure in terms of the cyber crimes,=E2=80=9D he said. =E2=80=9CIt is necessary for 
ethical hackers across the globe to converge and share knowledge.=E2=80=9D

Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Visit InfoSec News 

Site design & layout copyright © 1986-2014 CodeGods