I read this very interesting article about Adam Penenberg challanging hackers to hack him. Some ethical hackers accepted the challenge and performed a series of hacking. Firstly, they researched Adam to find out Adam’s personal information including his address, family members, emails, ect. Then they use found out Adam’s wireless network and camped around Adam’s house. They created a special device and attached it to Adam’s house to interact with Adam’s wireless network. Finally they drafted an email with an application inside that activate when the email is opened, and sent the emial to Adam’s wife. As a result they took control of her computer.
Fortunately, Adam didn’t lose anything from this experience. At the end the hackers provide some suggestions:
a) be careful about what you post online because
b) be caustious about email attachment and links because they may contain malware.
c) add security controls to mobile phone
Check out the original aritcle from the link below