Almost a decade ago, the first iPhone was introduced to the world in 2007.

Since then, consumer’s response foreshadowed the ever-advancing relationship between technology and humans.  Thousands of new and redesigned devices are made and put out on the market to see if people will bite.

It’s now 2016 and technology has provided a new area of convenience, creativity and possibility that people have never seen before.  Yet all the advancement in technology equals greater opportunities for hackers to interfere and intrude on people’s privacy.

Hacking is no longer confined to computers, laptops, tablets and smartphones and any wireless device that uses Wi-Fi is susceptible to being hacked.  While some hacker’s main motivator to hack a business is to gain a company’s confidential data or drain the bank accounts of an unsuspecting individual, some hackers enjoy playing with people on a more personal level.

If you want to avoid being the target of an unreasonable hacker, read on to learn what hot and trending wireless products are hackable.


  1. Hello Barbie


One of America’s most iconic dolls can now talk and listen to boys and girls all over the world, with a built-in microphone and Wi-Fi connection.  Barbie uses an interactive technology that is similar to SIRI, including already programmed questions that ask children about their likes and dislikes.

Children’s imagination and innocence can lead them to sharing personal and private information with the doll.  All recordings are stored on the servers of Mattel’s partner ToyTalk and sent through the internet.

While assuming ToyTalk has high cyber defenses intact and a skilled cybersecurity team, there is still the possibility of an individual hacking into ToyTalk’s server, retrieving and exploiting all of the recordings.

Because Hello Barbie connects to Wi-Fi, hackers can also trick the doll to connecting to a planted hotspot, eavesdrop on children’s conversations, and even send the doll different replies.

Besides the possibility of someone intruding and violating the privacy of children, people who have taken the time to read ToyTalk’s privacy policy have discovered a section that isn’t the most reassuring.  A section in the policy says ToyTalk can use the recordings for data analysis and share them with third parties to improve the speech recognition technology.


  1. Automobiles


Car brands, like Chrysler and BMW, that offer internet-connected computer features are now re-evaluating their technology and software after an experiment conducted by WIRED proved that one of the latest Jeep Cherokee models could be controlled by someone other than the driver.

While the cars possess flashy features like offering a Wi-Fi hotspot, navigation & entertainment control panels, and Bluetooth, WIRED proved that hackers can intercept the connection and manipulate features like the AC, stereo, the engine, and even disable the brakes.

Hackers can find any Jeep’s GPS coordinates and target any Chrysler car with the brand’s Uconnect’s cellular connection if they know the car’s IP address.

To protect drivers, companies like Tesla and Chrysler are now hosting bug bounties, for hackers to detect and find any weaknesses and loopholes in the technology.


  1. Fitness Devices


The health craze is only advancing with the new tech devices developed to encourage and push people towards a healthier lifestyle.

Step and workout trackers like Fitbit took the market by the storm and soon millions of consumers were walking around with the wireless bracelets on their wrists.

While these devices can positively affect health and weight-loss, researchers have discovered a backdoor for hackers to gain access to people’s health data.

The Bluetooth radio on fitness tracking devices is the entry point for hackers to reconfigure all stored data, and even download malware on computers.  Hackers can control wireless fitness device from 15 ft. away, as long as they are within the Bluetooth’s perimeter.  So any lurker can be waiting in parks or gyms and target health nuts all around.