• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
FacebookTwitterLinkedInInstagramYoutube
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Research
  • Home
  • / ...
  • /Tech News
  • /Research

Are IoT Apps Doing Enough to Protect Your Privacy?

By IEEE Computer Society Team on
July 19, 2022
LATEST NEWS
Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration
Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration
IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age
IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age
Platform Engineering: Bridging the Developer Experience Gap in Enterprise Software Development
Platform Engineering: Bridging the Developer Experience Gap in Enterprise Software Development
IEEE Std 3158.1-2025 — Verifying Trust in Data Sharing: Standard for Testing and Performance of a Trusted Data Matrix System
IEEE Std 3158.1-2025 — Verifying Trust in Data Sharing: Standard for Testing and Performance of a Trusted Data Matrix System
IEEE Std 3220.01-2025: Standard for Consensus Framework for Blockchain System
IEEE Std 3220.01-2025: Standard for Consensus Framework for Blockchain System
Read Next

Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration

IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age

Platform Engineering: Bridging the Developer Experience Gap in Enterprise Software Development

IEEE Std 3158.1-2025 — Verifying Trust in Data Sharing: Standard for Testing and Performance of a Trusted Data Matrix System

IEEE Std 3220.01-2025: Standard for Consensus Framework for Blockchain System

Mapping the $85B AI Processor Landscape: Global Startup Surge, Market Consolidation Coming?

AI Agentic Mesh – A Foundational Architecture for Enterprise Autonomy

IEEE O.C A.I “DEVHACK” Hackathon 2025 Winner Celebration

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter

IoT apps are enabling controls for users to protect their data and privacyIoT apps are enabling controls for users to protect their data and privacyThe Internet of Things (IoT) opens up a virtually unlimited world of possibilities, but hackers have also put IoT devices and apps within their crosshairs. As a result, these devices often introduce vulnerabilities that impact users and the networks they connect to. Considering the significant role that IoT devices play in industrial applications, there’s a lot more at risk than faulty fitness apps and smart toilets.

The Root Cause of Many IoT Security Issues


With IoT devices, information flows from a device to a large data sink. If attackers can bypass a device’s security protections, they gain access to critical, sensitive backend resources.


Want More Tech News? Subscribe to ComputingEdge Newsletter Today!


IoT devices got off to a bad start, primarily because many of them were sold to users with extremely easy-to-guess default passwords. The problem was the vulnerable device would then get incorporated into a sensitive network. This gave hackers a relatively easy inroad to a network that would have been otherwise difficult to hack.

How Hackers Use Platforms to Gain Access to IoT Apps


The hack can also work in reverse. Because too many platforms have to interface with IoT apps, a hacker can use this interaction against the device itself.

For example, if an enterprise resource planning platform (ERP) that runs a manufacturing business communicates with IoT devices on the factory floor, each device is connected to the ERP. An insider attack by someone with access credentials to the ERP could relatively easily compromise one or more of the IoT devices connected to it.