Five of the Most Hacked IoT Consumer Devices – What You Need to Know

The Internet of Things (IoT) has revolutionized consumer technology, but it also opens up new opportunities for cyberattacks. Cybercriminals are increasingly targeting IoT consumer devices, exploiting vulnerabilities in security cameras, smart home devices, and even smart cars. Understanding which IoT devices are most at risk of being hacked can help consumers stay protected.

Based on recent research, here are the most hacked IoT consumer devices:

  1. Security Cameras and Smart Home Devices
    These devices are highly susceptible due to weak default passwords, outdated firmware, and exposure to public internet connections [1].

  2. Smart Meters and IoT in Smart Grids
    Smart meters are often targeted to manipulate energy consumption data and compromise the larger energy infrastructure [2].

  3. Wearable Healthcare Devices
    IoT healthcare devices are particularly vulnerable, putting sensitive personal health information at risk [3].

  4. Smart Cars
    As vehicles become more connected, they are increasingly targeted by hackers for remote exploitation [4].

  5. Consumer IoT Devices (Smart Speakers, Thermostats, etc.)
    These devices are common targets due to poor security protocols and extensive connectivity with other devices [5].

Why These IoT Devices Are at Risk

IoT devices are often exploited due to weak authentication protocols, unpatched vulnerabilities, and inadequate encryption. Many devices come with default passwords that users fail to change, making them easy targets for attackers.

How to Protect Your IoT Devices

  • Change default passwords and use strong, unique ones.
  • Keep firmware and software updated.
  • Disable unnecessary features and remote access.
  • Use network segmentation to isolate IoT devices from critical systems.

Take Action: How AV-Comparatives Can Help

For Consumers: Ensure that your IoT devices are secure by choosing products that have been tested and certified by AV-Comparatives. Certification guarantees that the device has undergone rigorous security testing to protect against common threats.

For IoT Vendors: Want to build consumer trust and improve the security of your devices? Partner with AV-Comparatives to have your IoT products independently tested and certified. Contact us to learn more and begin the certification process.

Stay informed and protected in the evolving IoT landscape!

 

References

[1] Rajkumar, K. (2025). Semi-Supervised Deep-ELM for DDoS Attack Detection and Mitigation Using the OptimalLink Model in IoT Networks. Computers & Security.
[2] Laha, S. R., Pattanayak, B. K., & Pattnaik, S. (2024). Challenges Associated with Cybersecurity for Smart Grids Based on IoT. Taylor & Francis.
[3] Murthy, A. S. D., Nidhya, M. S., & Gurumoorthi, E. (2025). Attacks in IoT Healthcare Wearable Sensors. IGI Global.
[4] Kwon, S., & Lee, H. (2024). Willingness to Pay for Smart Car Security. IEEE Access.
[5] Ahmed, M. A., & Babu, P. R. (2024). Hybridization of Swarm and Graph Convolutional Network for DDoS Detection in IoT. Scientific Reports.

Skip to content