{"id":56108,"date":"2024-05-20T14:04:01","date_gmt":"2024-05-20T14:04:01","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35901\/How-I-Upgraded-My-Water-Heater-And-Discovered-How-Bad-Smart-Home-Security-Can-Be.html"},"modified":"2024-05-20T14:04:01","modified_gmt":"2024-05-20T14:04:01","slug":"how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/","title":{"rendered":"How I Upgraded My Water Heater And Discovered How Bad Smart Home Security Can Be"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/GettyImages-1487523781-800x533.jpg\" alt=\"The bottom half of a tankless water heater, with lots of pipes connected, in a tight space\"><figcaption class=\"caption\">\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/GettyImages-1487523781-scaled.jpg\" class=\"enlarge-link\" data-height=\"1707\" data-width=\"2560\">Enlarge<\/a> <span class=\"sep\">\/<\/span> This is essentially the kind of water heater the author has hooked up, minus the Wi-Fi module that led him down a rabbit hole. Also, not 140-degrees F\u2014yikes.<\/div>\n<div class=\"caption-credit\">Getty Images<\/div>\n<\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/gadgets\/2024\/05\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">282<\/span> <\/a> <\/aside>\n<p> <!-- cache hit 34:single\/related:76dece37ad46e9f982f68dd2a40c60f0 --><!-- empty --><\/p>\n<p>The hot water took too long to come out of the tap. That is what I was trying to solve. I did not intend to discover that, for a while there, water heaters like mine may have been open to anybody. That, with some API tinkering and an email address, a bad actor could possibly set its temperature or make it run constantly. That\u2019s just how it happened.<\/p>\n<p>Let\u2019s take a step back. My wife and I moved into a new home last year. It had a Rinnai <a href=\"https:\/\/www.energy.gov\/energysaver\/tankless-or-demand-type-water-heaters\">tankless water heater<\/a> tucked into a utility closet in the garage. The builder and home inspector didn&#8217;t say much about it, just to run a yearly cleaning cycle on it.<\/p>\n<p>Because it doesn\u2019t keep a big tank of water heated and ready to be delivered to any house tap, tankless water heaters save energy\u2014up to 34 percent, <a href=\"https:\/\/www.energy.gov\/energysaver\/tankless-or-demand-type-water-heaters\">according to the Department of Energy<\/a>. But they&#8217;re also, by default, slower. Opening a tap triggers the exchanger, heats up the water (with natural gas, in my case), and the device has to push it through the line to where it&#8217;s needed.<\/p>\n<p>That led to me routinely holding my hand under cold water in the sink or shower, waiting longer than felt right for reasonably warm water to appear. I understood the water-for-energy trade-off I was making. But the setup wasted time, in addition to potable water, however plentiful and relatively cheap it was. It just irked me.<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>Little did I know the solution was just around the corner.<\/p>\n<h2>Hot water hotspot<\/h2>\n<div class=\"gallery shortcode-gallery gallery-wide\">\n<ul>\n<li data-thumb=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/heater1-150x150.png\" data-src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/heater1.png\" data-responsive=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/heater1-980x1306.png 1080, https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/heater1.png 2560\" data-sub-html=\"#caption-2020169\">\n<figure><figcaption id=\"caption-2020169\"> <span class=\"icon caption-arrow icon-drop-indicator\"><\/span> <\/p>\n<div class=\"caption\"> Attention! <\/div>\n<div class=\"credit\"> <span class=\"icon icon-camera\"><\/span> Kevin Purdy <\/div>\n<\/figcaption><\/figure>\n<\/li>\n<li data-thumb=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/heater2-150x150.png\" data-src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/heater2.png\" data-responsive=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/heater2-980x736.png 1080, https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/heater2-1440x1082.png 2560\" data-sub-html=\"#caption-2020168\">\n<figure><figcaption id=\"caption-2020168\"> <span class=\"icon caption-arrow icon-drop-indicator\"><\/span> <\/p>\n<div class=\"caption\"> Nothing&#8217;ll happen. Just touch it. It&#8217;s what you wanna do. It&#8217;s there for you to touch. <\/div>\n<div class=\"credit\"> <span class=\"icon icon-camera\"><\/span> Kevin Purdy <\/div>\n<\/figcaption><\/figure>\n<\/li>\n<li data-thumb=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/IMG_C21678B19677-1-150x150.jpeg\" data-src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/IMG_C21678B19677-1.jpeg\" data-responsive=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/IMG_C21678B19677-1-980x1528.jpeg 1080, https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/IMG_C21678B19677-1.jpeg 2560\" data-sub-html=\"#caption-2020184\">\n<figure><figcaption id=\"caption-2020184\"> <span class=\"icon caption-arrow icon-drop-indicator\"><\/span> <\/p>\n<div class=\"caption\"> The Rinnai Central app. It does this &#8220;Control failed&#8221; bit quite often. <\/div>\n<\/figcaption><\/figure>\n<\/li>\n<\/ul><\/div>\n<p>I mean that literally. When I went into the utility closet to shut off the hose bibbs for winter, I noticed a plastic bag magnetically stuck to the back side of the water heater. \u201cAttention! The Control-R Wi-Fi Module must be installed for recirculation to operate,\u201d read the intense yellow warning label. The water heater would not &#8220;recirculate&#8221; without it, it noted.<\/p>\n<figure class=\"image shortcode-img right medium\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/module.jpg\" class=\"enlarge\" data-height=\"500\" data-width=\"500\" alt=\"The Rinnai Control-R module, out of bag.\"><img loading=\"lazy\" decoding=\"async\" alt=\"The Rinnai Control-R module, out of bag.\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/module-300x300.jpg\" width=\"300\" height=\"300\" srcset=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/module.jpg 2x\"><\/a><figcaption class=\"caption\">\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/module.jpg\" class=\"enlarge-link\" data-height=\"500\" data-width=\"500\">Enlarge<\/a> <span class=\"sep\">\/<\/span> The Rinnai Control-R module, out of bag.<\/div>\n<\/figcaption><\/figure>\n<p><a href=\"https:\/\/www.rinnai.us\/professional\/tankless-water-heaters\/recirculation-accessories\">Recirculation<\/a> means that the heater would start pulling water and heating it on demand, rather than waiting for enough negative pressure from the pipes. To trigger this, Rinnai offered smartphone apps that could connect through its servers to the module.<\/p>\n<p>I found <a href=\"https:\/\/www.rinnai.us\/sites\/default\/files\/2021-02\/100000400-Rinnai-Control-R-Wi-Fi-Module-Installation-Manual-%28Full%20Version%29.pdf\">the manual<\/a>, unplugged the water heater, and opened it up. The tone of the language inside (\u201cDO NOT TOUCH,\u201d unless you are \u201ca properly trained technician\u201d) did not match that of the can-do manual (\u201cget the most from your new module\u201d). But, having read the manual and slotted little beige nubs before, I felt trained and technical. I installed the device, went through the typical \u201cConnect your phone to this weirdly named hotspot\u201d process, and\u2014it worked.<\/p>\n<p>I now had <a href=\"https:\/\/www.rinnai.us\/residential\/rinnai-central-mobile-app\">an app<\/a> that could start recirculation. I could get my shower hot while still in bed, or get started on the dinner dishes from the couch. And yet pulling out my phone whenever I wanted hot water felt like trading one inconvenience for another.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35901\/How-I-Upgraded-My-Water-Heater-And-Discovered-How-Bad-Smart-Home-Security-Can-Be.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":56109,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[256],"class_list":["post-56108","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How I Upgraded My Water Heater And Discovered How Bad Smart Home Security Can Be 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How I Upgraded My Water Heater And Discovered How Bad Smart Home Security Can Be 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-20T14:04:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/GettyImages-1487523781-800x533.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How I Upgraded My Water Heater And Discovered How Bad Smart Home Security Can Be\",\"datePublished\":\"2024-05-20T14:04:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/\"},\"wordCount\":588,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/05\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be.jpg\",\"keywords\":[\"headline,hacker,flaw\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/\",\"name\":\"How I Upgraded My Water Heater And Discovered How Bad Smart Home Security Can Be 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/05\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be.jpg\",\"datePublished\":\"2024-05-20T14:04:01+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/05\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/05\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be.jpg\",\"width\":800,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,flaw\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflaw\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How I Upgraded My Water Heater And Discovered How Bad Smart Home Security Can Be\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How I Upgraded My Water Heater And Discovered How Bad Smart Home Security Can Be 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/","og_locale":"en_US","og_type":"article","og_title":"How I Upgraded My Water Heater And Discovered How Bad Smart Home Security Can Be 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-05-20T14:04:01+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/GettyImages-1487523781-800x533.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How I Upgraded My Water Heater And Discovered How Bad Smart Home Security Can Be","datePublished":"2024-05-20T14:04:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/"},"wordCount":588,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/05\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be.jpg","keywords":["headline,hacker,flaw"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/","url":"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/","name":"How I Upgraded My Water Heater And Discovered How Bad Smart Home Security Can Be 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/05\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be.jpg","datePublished":"2024-05-20T14:04:01+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/05\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/05\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be.jpg","width":800,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflaw\/"},{"@type":"ListItem","position":3,"name":"How I Upgraded My Water Heater And Discovered How Bad Smart Home Security Can Be"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=56108"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56108\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/56109"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=56108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=56108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=56108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}