Image: Woman with computer © Don Mason, Blend Images, Corbis

If anything in your home communicates data over a network or to an outside source, it can be hacked.

That's the harsh reality that online-security companies such as Symantec and Superior Solutions face, and one device-centric security firm -- Mocana -- is preparing for a post-PC world where everyone is wired and every device from a smartphone to the kitchen refrigerator is connected to a network. Even without hackers figuring out how to access every corner of a user's life, cybercrime is becoming a big industry.

A report released by Symantec earlier this month found that cybercrime cost victims $388 billion in time and money last year alone, hitting 431 million people in 24 countries. That number is rising steadily; the 54% of online adults who were victims of computer virus or malware attacks this year is up from 51% last year. Attacks against mobile devices are soaring as well, with Kapersky Labs finding that 65% more smartphones, tablets and other devices were targeted for malware attacks last year, compared with 2009.

A Mocana survey, meanwhile, found that 64% of professionals at companies including Apple, AT&T, Intel, IBM and Microsoft had experienced an attack on a non-PC device that required the attention of their IT staff. An additional 54% said that attack disrupted the company's network, but 51% said their companies still didn't update security or create patches to protect information on devices.

Researchers at Germany's University of Ulm discovered that Google Android devices not updated to the latest version of their operating system put calendar data, phone numbers, home addresses and email addresses at risk each time they connect to a network, making personal smartphones and tablets prime hacking targets. The hacking of Sony's PlayStation Network back in April, the ensuing shutdown and the exposure of nearly 100 million users' information brought the hacking problem home, without involving a PC, a tablet or even a smartphone to get in.

"If you look at every sector of the economy, it's consumer electronics, it's smart-grid and smart-energy infrastructure, it's health care and medical devices, it's industrial control, it's aerospace and defense, it's retail and it's transportation logistics," says Adrian Turner, the chief executive of Mocana. "All of those markets have or will have connected devices."

We spoke with executives at Mocana and Superior Solutions and found that security flaws on the following items allow as much access for hackers as a lockless door would for a passing burglar:

Internet televisions

There's some great, convenient, connected technology out there that makes life in the living room a lot easier. Those devices also make it a lot easier for hackers to get your information, passwords and even money as you use your HDTV to play around on the Internet.

"In the home, you have this whole other phenomenon, which is the explosion of phones, tablets and the next big wave, which is Internet-connected TVs," says Turner. "According to Moore's Law and the fact that we think in a linear way and don't realize how powerful these computers are getting -- or that $1 worth of computer power today will be worth 3 cents in five years -- we don't realize that these TVs are as powerful as the computers that were sitting on our desk 10 years ago."

Mocana bought several of the most popular Internet TVs just before the last holiday season and discovered that they were wide open to attacks. While most online TV functions are as benign as checking the weather with a Weather Channel app, getting scores through a Fox Sports app or cruising a Netflix queue, applications such as Amazon On-Demand pay-per-view -- which give hackers a financial incentive to access your network and steal passwords and other information -- prove problematic even when secured.

The holes in current Internet-TV security are just wide enough to allow hackers to present fake credit card forms and fool consumers into giving up their private information; intercept and redirect Internet traffic, which can trick consumers into thinking fake bank and shopping websites are legit; or steal TV manufacturers' digital "corporate credentials" to access a user's search engine or video-streaming and photo-sharing services.

The Sony hacks hit users through a network, but Internet televisions cut out the middleman entirely if they're not properly secured. That's upsetting now, but it could become much more troublesome by 2015, the year television market-research group DisplaySearch says 500 million Internet-connected TVs will be sold worldwide.

"There are issues with the majority of customers we work with, and a lot of the problem is implementation," Turner says. "You look at the Sony PS3 incident, and that was a well-thought-through, multilayered security model where they made some poor decisions when it came to implementation."

Home security systems

Sure, it's great that you can control your alarms, locks and remote notification through your smartphone and check your security cameras online. Just realize that means hackers can use those same commercial-friendly conveniences against you if they're able to access your home security system.

"People tend to think of these things as very different, but they're actually the same from a security perspective," says Turner, whose company also provides security software for video surveillance equipment, security systems and even Honeywell's building automation systems. "It's an Internet-connected device, it has a certain processor and operating system, and it's that combination of OS and CPU that people looking to break into a system or automated scripts to find devices are looking for."

But how would a hacker get in? If your home is protected through an X10 automation system, for example, the answer lies in the power lines. Last month, two security researchers went to a convention in Vegas and showed off tools they'd created that could tap into the power lines that home automation systems use to communicate. From there, hackers could monitor the house lights to see when occupants were away, jam alarm signals, block alerts to police and fire departments, disable motion sensors or even just overload the system with a flood of commands.

If all that seems far too complicated for a novice hacker, why not just sneak in through the automatic garage door? This was much easier years ago, when garage door locks used a PIN code set on the remote and garage door control. But even today's newer systems using what's called an IperCODE are fairly easy to get around, as evidenced by the sheer number of hacking products that come up under a simple search engine query for IperCODE.

"While it offers more protection, it too has been hacked," says Michael Gregg, the chief operating officer of Superior Solutions. "There are programs (not in the Apple Store) that can create rolling codes to attempt to pair with the garage door and obtain access."

Once you're in the garage, it gets much easier to access . . .

Cars

Slim jims, wire hangers, bashed windows? These are the methods cavemen use to break into and steal cars. Today, it's a lot less messy and labor-intensive.

"Beyond the TV, we think the car is the next connected platform," Mocana's Turner says. "It is security services, diagnostic services and entertainment services, and there's a lot of promise for these systems to communicate with each other."

Five years ago, cybercriminals stole two of soccer superstar David Beckham's BMW X5s by using a laptop and transmitter to unlock them and activate the ignition. A jammer is placed close to the car and prevents the owner from being able to remotely lock or unlock it, while a scanner rolls through all possible codes looking for a match. As there are about 3 billion codes, the 10- to 15-minute process still isn't the most effective way for hackers to break into an automobile.

Given the other, potentially deadlier options, car owners should feel lucky if only their locks and starter are hacked. Car dealerships are more commonly using remote vehicle-immobilization systems to cut the ignition or repeatedly honk the horns of cars whose owners aren't paying in a timely fashion. A recently laid-off worker at an Austin, Texas-area dealership hacked into his former employer's records, began tampering with payment information and disabled 100 cars before the dealership reset all employee passwords and police traced the employee's IP address.

Even that seems like a prank compared with what scientists from the University of California and the University of Washington were able to do with cars last year: hack a car's computer through wireless connections similar to General Motors' OnStar system, control the car while it was in motion, apply the brakes, selectively brake each wheel to steer, and shut down the engine completely. They were also able to shut down the brake and accelerator completely so the driver would have no control whatsoever -- then removed malware once the vehicle had crashed.

"To date, automotive systems have not been widely targeted, primarily because attackers like to go where there is access to money or sensitive data," Superior Solutions' Gregg says. "There's no big monetary prize in attacking such devices. However, many of these products are relying on security by obscurity."

Basically, automakers are just hoping hackers won't spend the time or effort to figure out that cars can be hacked through tire pressure monitors, as researchers from Rutgers University and the University of South Carolina discovered last year, or through Bluetooth connections and music files, as the same University of Washington and University of California researchers found earlier this year.

"There's a lot of discussion about the car systems and entertainment systems being on separate buses within the car, so if someone breaks through via a browser-based or entertainment-based system, they won't be able to set off the airbags or muck with the brakes," Mocana's Turner says.

But even hacking your car, cutting the brakes and setting up a potentially fatal crash seems less direct than remotely pulling the plug on . . .

Medical equipment

Yeah, that pacemaker that keeps your heart going, or that defibrillator that gives Grandpa a jolt if his heart stops, or that insulin pump that keeps your diabetic sibling stable -- it's all completely hackable.

"These devices also send data to the outside world by means of radio frequency communication, which could allow someone to send rogue instructions to an implanted device by intercepting the device's wireless signal and then broadcasting a different signal," Superior Solutions' Gregg says. "When a computer fails, you reboot it, but when a pacemaker fails, someone could die."

He's not kidding, and researchers, lawmakers and the Federal Drug Administration aren't laughing. In June, the FDA stopped treating medical device software updates as accessories that required weeks or months of premarket approval processes and started treating them as patches critical to the safety of patients that need to be released immediately. Just last month, researchers at the Massachusetts Institute of Technology and the University of Massachusetts Amherst proposed a method for jamming foreign signals that could shut down defibrillators and prompted members of the House Energy and Commerce Committee to call for hearings on the safety of these devices.

Click here to become a fan of MSN Money on Facebook

"What's different about this era of computing is that a lot of these devices are going into critical context, and then this data that's moving across them is becoming more valuable, whether you're talking about a handset with enterprise data or a medical device that's in the field," Mocana's Turner says. "Unfortunately, these systems are so porous today that bad things will happen, and there will be physical consequences because of the nature of the devices."

At the very least, Turner insists that vulnerability will lead to lawsuits that will push insurance companies to enact a universal, manufacturer-neutral set of guidelines for securing these devices before they can be covered. In the worst-case scenario, however, a hacker's keyboard becames a deadly weapon.

"While this may seem far-fetched, attackers will always think outside the box," Gregg says. "Such attacks could be of interest to terrorists or others looking to target government officials or military leaders."

This article was reported by Jason Notte for the Street.