SHARE
Facebook X Pinterest WhatsApp

IoT Hacking: Contest Finds Numerous IoT Security Lapses

A large number of IoT devices still suffer from lax security.

Written By
thumbnail
Sue Walsh
Sue Walsh
Sep 16, 2016

The results of the DEF CON hacking contest are in and the news is dismal for the IoT. Contestants found 47 new IoT security flaws across 23 products from 21 different manufacturers. IoT security woes are nothing new, but the results of IoT hacking show that things are getting worse, not better.

“The Internet of Things will allow for attacks we can’t even imagine,” wrote prolific tech and security researcher Bruce Schneier. “The next president will probably be forced to deal with a large-scale internet disaster.”

The contest revealed several smart lock brands that are highly vulnerable to password sniffing and replay attacks, and one that allowed a hacker to convert guest access into permanent admin access.

Thermostats also made headlines again, with yet another one found to be transmitting data, including passwords and user names, in plain text. This would make it easy for a hacker to take control of the home’s climate control remotely. Sounds harmless, but imagine if a hacker was able to install ransomware on it that turned the furnace and and off every few minutes until the user paid. If they didn’t, their heating system could suffer severe (and very costly) damage.

Solar energy management was another hot spot. Several security flaws were found in a solar array management device including a wide open access point, a command injection flaw, and no network segmentation. According to Computerworld, if a hacker exploited such vulnerabilities, they could shut down a mid-size power plant and cause physical damage to the array.

Even wheelchairs had issues. One particular type of smart wheelchair had vulnerabilities that could allow a hacker to remotely disable safety features or even take control of the chair.

Advertisement

How bad is IoT security? Very

IoT interoperability: an Internet of Broken Things

IoT hacking: three ways devices and data are vulnerable

thumbnail
Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Recommended for you...

Open Source Talent Shortage Expected To Increase in 2022
David Curry
Jul 12, 2022
Volvo Puts IoT and AI in the Driver’s Seat for Vehicle Connectivity
Sue Walsh
Nov 6, 2020
Cybersecurity and Digital Trust Companies Team for IoT Threats Detection
Sue Walsh
Oct 12, 2020
Cornell Researchers Create the Country’s First Statewide IoT Network
Sue Walsh
Oct 9, 2020

Featured Resources from Cloud Data Insights

The Manual Migration Trap: Why 70% of Data Warehouse Modernization Projects Exceed Budget or Fail
The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.