Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

17 ways the Internet of Things can go horribly wrong

10 of 17 NEXT PREV
  • Hackers can take over your gun

    Hackers can take over your gun

    Rapid growth in the "Internet of Things" space means two things. First, it means that everything we own will soon be Internet-connected. Second, it means that hackers will soon have access to everything we own, by virtue of it all being Internet-connected.

    Hackers Runa Sandvik and Michael Auger, for example, have discovered that the TrackingPoint TP750, a $13,000 Wi-Fi-enabled rifle with a built-in aiming computer, can be hacked with disastrous consequences.

    In one scenario, a rifle user aimed the gun at the bullseye of a target. But when the hacked weapon was fired, the bullet instead hit the bullseye of a different target 2.5 feet away. The researchers were also able to disable the gun completely.

    The financially troubled TrackingPoint acknowledged the vulnerability, but argues: "We question why a hacker with a laptop would follow around a red-blooded American carrying one of our guns."

    Published: February 23, 2017 -- 10:17 GMT (02:17 PST)

    Photo by: TrackingPoint

    Caption by: Fox Van Allen

  • Hackers can give you a deadly OD

    Hackers can give you a deadly OD

    Medical device makers are embracing wireless communications functionality in their products -- meaning that hackers now have an electronic pathway directly into our bodies. And indeed, security researchers have already found potentially fatal vulnerabilities in these devices.

    Security expert Billy Rios, for example, discovered that drug pumps manufactured by Hospira contain security flaws that hackers could exploit to give patients a deadly overdose.

    Hospira notes that there have been no reported incidents of such hackings, and that hospital firewalls are the first line of defense to its devices. The company is working with its customers to address the vulnerabilities.

    Published: February 23, 2017 -- 10:17 GMT (02:17 PST)

    Photo by: ER Productions/CORBIS

    Caption by: Fox Van Allen

  • Hackers can stop your heart

    Hackers can stop your heart

    Concerns over hacking were great enough that doctors disabled the wireless features on Vice President Dick Cheney's heart pump to protect him from terrorists.

    "It seemed to me to be a bad idea for the vice president to have a device that maybe somebody on a rope line or in the next hotel room or downstairs might be able to get into -- hack into," the veep's cardiologist told 60 Minutes.

    Published: February 23, 2017 -- 10:17 GMT (02:17 PST)

    Photo by: Stuart Sipkin/Demotix/Corbis

    Caption by: Fox Van Allen

  • Hackers can curse out your baby

    Hackers can curse out your baby

    Your newborn baby looks so peaceful sleeping in her crib. Hackers know this too, since half (!) of the home baby monitors tested late last year by security firm Rapid7 were revealed to have significant security vulnerabilities that allow remote access by total strangers.

    In one known incident, parents in Houston, Texas discovered that a hacker from Europe had accessed their Foscam Baby Monitor, and was using its two-way communications feature to shout insults at their 2-year-old daughter.

    Published: February 23, 2017 -- 10:17 GMT (02:17 PST)

    Photo by: Jinxy Productions/Blend Images/Corbis

    Caption by: Fox Van Allen

  • Hackers can crash your plane

    Hackers can crash your plane

    If you think car hacks are bad, we have something far worse: Hackers may be able to gain access to airplane controls, thanks to Internet connectivity features.

    In April 2015, the U.S. Government Accountability Office (GAO) warned that the Boeing 787 Dreamliner, Airbus A350, and Airbus A380 are at all risk of hacking, because their cockpits use the same Wi-Fi network being used by passengers.

    A month later, the FBI alleged that a security researcher used a Cat6 ethernet cable to gain control over a United Airlines flight while a passenger.

    Published: February 23, 2017 -- 10:17 GMT (02:17 PST)

    Photo by: Westend61/Corbis

    Caption by: Fox Van Allen

  • Hackers can run you off the road

    Hackers can run you off the road

    It may sound like a far-fetched Hollywood plot device, but we assure you, this is real life: Hackers really can gain remote control of your car, thanks to poor IoT security.

    White hat researchers Charlie Miller and Chris Valasek announced last year that they could disable the transmission of a Jeep Cherokee via its Internet-connected in-dash entertainment system. They then demonstrated the hack for a Wired reporter by disabling his vehicle (with his permission) as he drove it down a highway Interstate.

    Car maker Chrysler has since provided a patch to the 471,000 vulnerable vehicles on the road.

    Published: February 23, 2017 -- 10:17 GMT (02:17 PST)

    Photo by: Jeep

    Caption by: Fox Van Allen

  • Hackers will turn cars into lethal weapons

    Hackers will turn cars into lethal weapons

    Fully autonomous cars are still (for the most part) in the research-and-development state. But that hasn't stopped some white hats from figuring out a way to break the technology.

    Security researcher Jonathan Petit, for example, was able to scramble the light detection and ranging (LIDAR) system on Google's self-driving car with little more than a $60 laser pointer setup.

    Both the FBI and Europe's Interpol are taking the public safety threat seriously, preparing for the possibility of autonmous cars being used as lethal weapons.

    Published: February 23, 2017 -- 10:17 GMT (02:17 PST)

    Photo by: Google

    Caption by: Fox Van Allen

  • Hackers can find your kids through their toys

    Hackers can find your kids through their toys

    Bad news for Barbie: Security firm Bluebox was able to hack the Wi-Fi enabled Hello Barbie doll to access the conversations children have had with it. Making matters even worse, security researcher Matt Jakubowski discovered a different vulnerability in the interactive toy that could give hackers the ability to track down the address of her owner.

    Mattel and ToyTalk, the company behind the doll's software, have worked to patch these flaws. ToyTalk has also set up a bug bounty program to better secure the doll moving forward.

    That's great news, of course. Still, we continue to question the wisdom of toys that upload the private conversations of children to a corporate cloud.

    Published: February 23, 2017 -- 10:17 GMT (02:17 PST)

    Photo by: CNET

    Caption by: Fox Van Allen

  • Hackers can target your toddlers

    Hackers can target your toddlers

    Toy maker VTech admitted late last year that hackers were able to exploit wide-open security holes in its company computer systems, stealing non-personally-identifiable data from 200,000 children who use its Kidizoom smartwatches (shown), InnoTab tablets, and related connectivity apps.

    Shortly after, it was revealed that hackers had also made off with "hundreds of gigabytes worth of profile photos, audio files, and chat logs-many of which belong to children."

    It's unclear exactly why VTech was storing the data itself in the first place.

    Published: February 23, 2017 -- 10:17 GMT (02:17 PST)

    Photo by: VTech

    Caption by: Fox Van Allen

  • Hackers can spy on you through your TV

    Hackers can spy on you through your TV

    Comic Yakov Smirnoff used to joke that in Soviet Russia, the television watches you. As it turns out, the same goes for televisions in the United States too.

    Samsung got into hot water with the public after it was revealed that the mics built in to its smart TVs were continuously recording and transmitting data to the company. Samsung's privacy policy warns that personal and other sensitive information may be picked up by the mic and transferred to third parties.

    Concerns over what Samsung would do with that data were somewhat overblown. The real worry here is what would happen if hackers illegally gained access to these features to spy on your family.

    You can learn how to disable Samsung's spying feature at CNET.

    Published: February 23, 2017 -- 10:17 GMT (02:17 PST)

    Photo by: Gene Blevins/LA DailyNews/Corbis

    Caption by: Fox Van Allen

  • Hackers can take over your whole home

    Hackers can take over your whole home

    Your smart home's security is only as good as its weakest link, as owners of the Insteon HUB home automation controller have learned.

    In 2013, Forbes reporter Kashmir Hill revealed that some owners of Insteon-run smart homes had made websites to remotely access their home automation systems. Because these systems did not require a username and password, hackers could remotely access their homes too, following a quick Google search.

    Published: February 23, 2017 -- 10:17 GMT (02:17 PST)

    Photo by: David Bro/ZUMA Press/Corbis

    Caption by: Fox Van Allen

  • Hackers can get in your home through your doorbell

    Hackers can get in your home through your doorbell

    Ring is a $199 Wi-Fi-enabled smart doorbell -- a high-tech way to see who's knocking at your door simply by looking at your phone. Unfortunately, a recent analysis of the device by network security firm Pen Test Partners reveals that hackers could easily exploit a design flaw in Ring to steal your home Wi-Fi key, which was being stored by the device in an unencrypted form.

    Ring has since patched the vulnerability via firmware update.

    Published: February 23, 2017 -- 10:17 GMT (02:17 PST)

    Photo by: Ring

    Caption by: Fox Van Allen

  • Hackers can turn your fridge into a spambot

    Hackers can turn your fridge into a spambot

    Beware: Your smart fridge may soon turn against you.

    During the Def Con 23 conference in Las Vegas, a group of IoT hackers discovered, through penetration testing, that the Samsung RF28HMELBSR smart refrigerator has security holes that could turn the appliance into a man-in-the-middle attacker.

    A separate group of researchers, meanwhile, discovered that hackers had recruited at least one smart fridge into a global spam botnet.

    Published: February 23, 2017 -- 10:17 GMT (02:17 PST)

    Photo by: Jason Ogulnik/dpa/Corbis

    Caption by: Fox Van Allen

  • Hackers can rob your home blind

    Hackers can rob your home blind

    Even the popular Nest smart thermostat can be used by hackers to gain access to your home networks, a trio of security researchers revealed at the Black Hat USA 2014 conference.

    According to Yier Jin, Grant Hernandez and Daniel Buentello, a hacker can load malware onto a Nest thermostat in just seconds via its USB port. From there, a criminal could mount an attack on your home network -- or simply use data from the Nest to learn when you're home and when you're not.

    Jin told Forbes in 2015 that a fix is impossible due to the way the hardware is built. Thankfully, this particular exploit requires a USB connection, so the hacker -- or an accomplice -- would first need physical access to your home before he or she could gain unfettered digital access.

    Published: February 23, 2017 -- 10:17 GMT (02:17 PST)

    Photo by: Karsten Lemm/dpa/Corbis

    Caption by: Fox Van Allen

  • Hackers can watch you strip naked

    Hackers can watch you strip naked

    Cameras are ubiquitious these days -- they're on our phones, tablets, computers and more. Unfortunately, these Internet-connected cameras can double as a hacker's spycam when afflicted with the right malware.

    Because many of these cameras come with default passwords, they're exceedingly easy to compromise. In fact, one criminal created a website featuring 11,000 live camera feeds, stolen from homes across the United States.

    And it's not just hackers who are using webcams to spy on people. A civil suit was filed against a school district in Pennsylvania after administrators used cameras on school-issued laptops to spy on kids and their families inside their homes without their knowledge. (The school paid $610,000 to settle the case.)

    Don't be a victim: Always change the default passwords of your IoT devices. You might also want to cover up your webcam when it's not in use.

    Published: February 23, 2017 -- 10:17 GMT (02:17 PST)

    Photo by: Ken Seet/Corbis

    Caption by: Fox Van Allen

  • Hackers can fly the unfriendly skies

    Hackers can fly the unfriendly skies

    A new type of malware called "Maldrone" can give a hacker full control over unmanned Parrot AR aircraft and any on-board camera equipment it may have.

    This means a hacker could use your own drone to spy on you.

    Published: February 23, 2017 -- 10:17 GMT (02:17 PST)

    Photo by: BUCK Studio/Corbis

    Caption by: Fox Van Allen

  • Hackers could wage war on us all

    Hackers could wage war on us all

    Or worse yet, a foreign government could install malware on U.S. military drones that carry deadly payloads. It could happen -- the U.S. Air Force struggled to keep malware off drones flying unmanned missions in Afghanistan.

    Published: February 23, 2017 -- 10:17 GMT (02:17 PST)

    Photo by: Ted Horowitz/Corbis

    Caption by: Fox Van Allen

10 of 17 NEXT PREV
Fox Van Allen

By Fox Van Allen | February 23, 2017 -- 10:17 GMT (02:17 PST)

  • Hackers can take over your gun
  • Hackers can give you a deadly OD
  • Hackers can stop your heart
  • Hackers can curse out your baby
  • Hackers can crash your plane
  • Hackers can run you off the road
  • Hackers will turn cars into lethal weapons
  • Hackers can find your kids through their toys
  • Hackers can target your toddlers
  • Hackers can spy on you through your TV
  • Hackers can take over your whole home
  • Hackers can get in your home through your doorbell
  • Hackers can turn your fridge into a spambot
  • Hackers can rob your home blind
  • Hackers can watch you strip naked
  • Hackers can fly the unfriendly skies
  • Hackers could wage war on us all

If the Internet is built into everything you own, none of it will be truly safe from hackers.

Read More Read Less

Hackers can spy on you through your TV

Comic Yakov Smirnoff used to joke that in Soviet Russia, the television watches you. As it turns out, the same goes for televisions in the United States too.

Samsung got into hot water with the public after it was revealed that the mics built in to its smart TVs were continuously recording and transmitting data to the company. Samsung's privacy policy warns that personal and other sensitive information may be picked up by the mic and transferred to third parties.

Concerns over what Samsung would do with that data were somewhat overblown. The real worry here is what would happen if hackers illegally gained access to these features to spy on your family.

You can learn how to disable Samsung's spying feature at CNET.

Published: February 23, 2017 -- 10:17 GMT (02:17 PST)

Caption by: Fox Van Allen

10 of 17 NEXT PREV

Related Topics:

Cloud Internet of Things Security Data Centers
Fox Van Allen

By Fox Van Allen | February 23, 2017 -- 10:17 GMT (02:17 PST)

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • TRENDnet TUC-ET5G USB-C 3.1 to 5GBASE-T Ethernet adapter

    Networking

    TRENDnet TUC-ET5G USB-C 3.1 to 5GBASE-T Ethernet adapter

  • Anker PowerExpand 8-in-1 USB-C hub

    Hardware

    Anker PowerExpand 8-in-1 USB-C hub

  • Netgear Orbi RBK752 tri-band Gigabit Wi-Fi 6 mesh

    Networking

    Netgear Orbi RBK752 tri-band Gigabit Wi-Fi 6 mesh

  • Plugable UD-CA1A USB-C dock

    Hardware

    Plugable UD-CA1A USB-C dock

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums