IoT Hacking: Contest Finds Numerous IoT Security Lapses - RTInsights

IoT Hacking: Contest Finds Numerous IoT Security Lapses

A large number of IoT devices still suffer from lax security.

Written By
Sue Walsh
Sue Walsh
Sep 16, 2016
2 minute read

The results of the DEF CON hacking contest are in and the news is dismal for the IoT. Contestants found 47 new IoT security flaws across 23 products from 21 different manufacturers. IoT security woes are nothing new, but the results of IoT hacking show that things are getting worse, not better.

“The Internet of Things will allow for attacks we can’t even imagine,” wrote prolific tech and security researcher Bruce Schneier. “The next president will probably be forced to deal with a large-scale internet disaster.”

The contest revealed several smart lock brands that are highly vulnerable to password sniffing and replay attacks, and one that allowed a hacker to convert guest access into permanent admin access.

Thermostats also made headlines again, with yet another one found to be transmitting data, including passwords and user names, in plain text. This would make it easy for a hacker to take control of the home’s climate control remotely. Sounds harmless, but imagine if a hacker was able to install ransomware on it that turned the furnace and and off every few minutes until the user paid. If they didn’t, their heating system could suffer severe (and very costly) damage.

Solar energy management was another hot spot. Several security flaws were found in a solar array management device including a wide open access point, a command injection flaw, and no network segmentation. According to Computerworld, if a hacker exploited such vulnerabilities, they could shut down a mid-size power plant and cause physical damage to the array.

Even wheelchairs had issues. One particular type of smart wheelchair had vulnerabilities that could allow a hacker to remotely disable safety features or even take control of the chair.

How bad is IoT security? Very

IoT interoperability: an Internet of Broken Things

IoT hacking: three ways devices and data are vulnerable

Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Featured Resources from Cloud Data Insights

Zero Trust Is Not a Product You Buy. But It’s Not a War You Win Alone, Either
Jamie Pugh
May 23, 2026
AI Workload Accelerators: Which Gives You the Biggest Bang for the Buck?
Why Legacy Data Stacks Are Failing in the Age of AI
Denzil Wessels
May 21, 2026
The Next AI Revolution Isn’t Generative. It’s Adaptive.
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.