{"id":782,"date":"2020-11-24T11:13:00","date_gmt":"2020-11-24T11:13:00","guid":{"rendered":"https:\/\/dev.cryptoloc.au\/?p=782"},"modified":"2023-10-03T06:23:59","modified_gmt":"2023-10-03T06:23:59","slug":"what-does-a-hacked-coffee-machine-look-like","status":"publish","type":"post","link":"https:\/\/127.0.0.1\/what-does-a-hacked-coffee-machine-look-like\/","title":{"rendered":"What does a hacked coffee machine look like?"},"content":{"rendered":"\n

Imagine if making your morning brew had the ability to torment you while also demanding a ransom in exchange for a swig of the bean juice that keeps us all going each day?<\/p>\n\n\n\n

As reported in Information Age<\/a>, a security firm researcher did just that.<\/p>\n\n\n\n

Martin Hron \u2013 who works for antivirus software maker Avast \u2013 picked apart a security weakness in an automatic coffee machine by reverse engineering it \u2013 and at the same time found a weakness in most IoT-connected devices. Watch the video to see his handy work in action.<\/p>\n\n\n\n

\n