Hackers and hacking have been around for a long time.
Cybernews, an online research-based publication that investigates and tracks hacking, said the term “was first used in relation to using technical know-how back in 1955 at a meeting of the Technical Model Railroad Club. In the meeting minutes, it was used to describe how members modified the functions of their high-tech train sets.”
More than 60 years later, there are lot more items around capable of being hacked than just high-tech train sets. So the folks at Bespoke Software Development (www.bespokesoftwaredevelopment.com) commissioned a study to find out what household items could be targets for hackers.
Using an online analytics tool, the company’s study found the No. 1 item, by far and away, was the cellphone. Worldwide, the study found that the phrase “How to know if your phone is hacked” or similar phrases were used 716,400 times during the study period, which took place earlier this month.
There were nine other items that made the list. Combined, the number of searches for those nine items totaled about 151,680 — less than a fourth the number of the cellphone searches.
MORE FROM GADGET DADDY:
Coming in a distant second was “computer hacked” (31,920 searches), followed by “iPad hacked” (29,160) and “wifi hacked” (23,760).
Drawing the least interest was “TV hacked” (12,960) and “baby monitor hacked” (9,840).
“As phones have become integral to modern life, it’s no surprise we are worried about them being hacked, with important passwords, financial and personal information all being at risk,” a spokesman for Bespoke said. “Spikes in data usage, performance issues, pop-ups, or changes to your screen are all indicators that your phone has been hacked.”
The spokesman went on to offer some simple tips to make electronics more difficult to hack:
• Change default passwords; use a password manager. Use different passwords for different accounts. The password manager can generate strong passwords and store them in encrypted form. Some password managers can be placed on a flash drive and used on different computers.
• Keep operating systems and apps up to date. Companies are constantly updating the security of their products and…