- IoT For All
- Posts
- The other worst part of an IoT security breach
The other worst part of an IoT security breach
As if the obvious parts weren't bad enough.
Hello readers,
Welcome to the IoT For All newsletter! This week we’re talking about viral IoT snafus, managing IoT at scale, IIoT energy management, and more!

Everyone knows the primary dangers of poorly-secured IoT devices: leaking data to bad actors, having your network swept up into a botnet, unexpected downtime, exposing essential systems to anyone and everyone. But on top of that, there’s another, perhaps underappreciated downside: It can be really embarrassing!
Last month, crossing the street in various cities across the United States was suddenly a little … different. When the voices of Mark Zuckerberg, Jeff Bezos, and other high-profile tech founders started coming out of unassuming crosswalk buttons, it was immediately obvious someone, somewhere had messed up. Naturally, it went viral, resulting in coverage from CNN, NBC, and countless social media posts.
Whose fault is it, exactly? It can be hard to pin down. Pressed by The Seattle Times, the Seattle Department of Transportation was quick to mention needing to consult with its vendor. The Register, meanwhile, provides juicier details on what happened:
“The hacked crosswalks all appear to come from a common source: Polara, America's leading manufacturer of pedestrian signal systems. … All of it can be managed [via Bluetooth] using the Polara Field Service app, which until recently was freely available on both the Google Play and Apple App Store.”
The system was password protected, of course — with a default code of “1234” per the company’s own documentation, along with instructions to change it. Whoever you may be inclined to blame, no one comes out looking good.
Security breaches that take place entirely in the digital realm can be a great deal more serious than a prank like this. Vandalized crosswalk buttons are small potatoes compared to the potential theft of, say, every Social Security number. But because IoT brings cyberspace into the physical world, even small-scale breaches can feel more real.
But of course, there have been far more serious security failures of this ilk. You may recall when hackers triggered 156 tornado alarms in Dallas, or the rash of Ring camera hacks in 2019. These incidents very understandably erode public trust in the essential tech infrastructure they may not realize they rely on.
In the grand scheme of security snafus, some goofy crosswalk messages might not seem all that harmful, but that’s precisely what makes a story like this likely to reach a viral tipping point. And once it’s on TikTok, you can’t patch the PR problem.
📖 Top Articles
From connected sensors on factory floors to smart meters in cities, businesses are using more IoT devices than ever to collect data and improve operations. But with this growth comes a big challenge: how to keep all those devices running smoothly, securely, and efficiently. Explore how smarter infrastructure is helping organizations simplify IoT operations, reduce downtime, and stay in control as their networks grow.
The Internet of Things (IoT) is transforming several industries, and healthcare is one of them. One area that is seeing significant development is billing, a traditionally complex part of this sector’s operations. With IoT, this process can become more accurate and efficient, serving medical providers and patients alike. | If you are building Industrial IoT (IIoT) energy monitoring applications in the oil & gas, solar, and wind industries, you’re likely facing some challenges in creating a robust data foundation capable of handling IIoT data at scale. The greatest difficulty lies in choosing a cost-effective enterprise-grade stack that natively accommodates Information Technology (IT) and Operational Technology (OT) data, eliminates data silos, and ingests, processes, analyzes, and visualizes data in real time. |
There's nothing artificial about this intelligence
Meet HoneyBook—the AI-powered platform here to make every client relationship more productive and prosperous.
With HoneyBook, you can attract leads, manage clients, book meetings, sign contracts, and get paid.
Plus, HoneyBook AI tool summarizes project details, generates email drafts, takes meeting notes, predicts high-value leads, and more.
🔥 Rapid Fire
Monogoto and Boat Fix bring real-time visibility and control to the recreational marine industry
Omnispace, Gatehouse Satcom and Nordic Semiconductor demonstrate 5G NB-IoT capability over non-geostationary S-band satellite
Ubiik launches freeRAN.net to boost private LTE & IoT connectivity
Silicon Labs unveils Series 3 SoCs targeting next generation IoT devices
Addverb partners with Infineon Technologies AG to deploy BLE safety in robotic fleet
🎙️ The IoT For All Podcast
In this episode of the IoT For All Podcast we talk to Michael Zolotov, CTO and co-founder of Razor Labs, about IoT in the mining industry. The discussion covers predictive maintenance, AI sensor fusion, real-world examples of predictive maintenance, the importance of automation, the impact of generative AI, and advice for companies looking to deploy solutions in harsh environments and heavy industries.
🗓️ Events & Webinars
Tobacco Dock, London The AI Summit London, the headline AI event of London Tech Week, unites the most forward-thinking technologists and business professionals to explore the real-world applications of AI. Think unparalleled opportunities for learning, deep-dive discovery, and non-stop networking (not to mention the incredible line-up of heavyweight speakers). June 11 - 12, 2025 |