Oh boy, oh boy! Where do I start in on this one.
First, I would like to ask, how is it that a hacker can read memory from a processor regardless of the operating system? Yes, Windows and Macintosh run with UNIX/Linux operating at the core, however, the architecture is vast enough I would imagine that it would be next to impossible to acquire access to the CPU without first navigating the operating system on the system? Unless, of course, it is on the BIOS or UEFI level...
Second - WordPress, WordPress is consistently having problems with black-hat hatters buying ownership of well known plug-ins and creating back doors within future releases. If you employ WordPress in any shape of form, one should be cautious. Seriously, its a growing problem;
https://www.wordfence.com/blog/2018/01/wordpress-supply-chain-attacks/Third - Samsung, Samsung Smart Television where cough recording conversations within the home without user consent. It is even stipulated within there user agreement, something like 'keep cautious of what you say around the television'. It's much older news now, so you would have to research it yourself if you are interested.
Fourth - Bose, Bose spies on what you listen to and for how long.
https://smartphones.gadgethacks.com/news/your-bose-headphones-are-spying-you-0177193/Fifth - ManTistek GK2, ManTistek was caught keylogging! Windows 10 has already been accused of this, however, ManTistek now joins the list.
https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.htmlSixth - Lenovo, Lenovo was cough shipping computers with RootKit's! Seriously, why do people still purchase from this companie?
https://thehackernews.com/2015/08/lenovo-rootkit-malware.htmlConclusion, This is just a list of the stuff I know about, I know there are many more. Nothing is safe. Anything you do or type is going somewhere, or more even more somewheres, then your intended destination. If it's not hackers, it's giant companies that you pay to use their product.
If anyone is really concerned, I would recommend getting the latest copy of "Network+" and "Hacking the Art of Exploitation, 2nd Edition". Yes, the second book is an older book (2008), however, lots of the info is still relevant. The best network security experts learn how to Hack.
EDIT: Corrected one semi-correct statement and touched up format.