Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
1/15/2016
01:00 PM
James Kane
James Kane
Slideshows
Connect Directly
Twitter
LinkedIn
RSS
E-Mail

The Internet of Private Things: 7 Privacy Missteps

A cautionary tale about the rules of 'Privacy by Design' and seven IoT companies that broke them in recent years.
3 of 8

Privacy as the Default

This should be obvious and will flow naturally if the first principle is followed but it is staggering how often major corporations fail to adhere to it. The tenet is that no action should be required on the part of individuals to protect their privacy; it should be built into the system by default. 

The importance of this principle was starkly demonstrated by Fitbit in 2011. Back then  Fitbit's default setting for profiles was public, meaning that if people chose to log their sexual activity (and a number did) a simple google search would reveal the time, the duration and even the intensity of a given person's lovemaking. Let's see if we can avoid this in 2016. 

(Image Source: Wikimedia) by Tim Bartel from Cologne, Germany, via Wikimedia Commons.

Privacy as the Default

This should be obvious and will flow naturally if the first principle is followed but it is staggering how often major corporations fail to adhere to it. The tenet is that no action should be required on the part of individuals to protect their privacy; it should be built into the system by default.

The importance of this principle was starkly demonstrated by Fitbit in 2011. Back then Fitbit's default setting for profiles was public, meaning that if people chose to log their sexual activity (and a number did) a simple google search would reveal the time, the duration and even the intensity of a given persons lovemaking. Lets see if we can avoid this in 2016.

(Image Source: Wikimedia) by Tim Bartel from Cologne, Germany, via Wikimedia Commons.

3 of 8
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
geriatric
67%
33%
geriatric,
User Rank: Moderator
1/19/2016 | 8:57:30 AM
Same Problem You Have
Companies who ignore privacy concerns have the same mentality as those who create and publish ugly pornographic images under the guise of business and industry-relevant articles. Who did your proof-reading - Hugh Hefner, Larry Flynt or Lena Dunham?
AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16319
PUBLISHED: 2019-09-15
In Wireshark 3.0.0 to 3.0.3 and 2.6.0 to 2.6.10, the Gryphon dissector could go into an infinite loop. This was addressed in plugins/epan/gryphon/packet-gryphon.c by checking for a message length of zero.
CVE-2019-16320
PUBLISHED: 2019-09-15
Cobham Sea Tel v170 224521 through v194 225444 devices allow attackers to obtain potentially sensitive information, such as a vessel's latitude and longitude, via the public SNMP community.
CVE-2019-16321
PUBLISHED: 2019-09-15
ScadaBR 1.0CE, and 1.1.x through 1.1.0-RC, has XSS via a request for a nonexistent resource, as demonstrated by the dwr/test/ PATH_INFO.
CVE-2019-16317
PUBLISHED: 2019-09-14
In Pimcore before 5.7.1, an attacker with limited privileges can trigger execution of a .phar file via a phar:// URL in a filename parameter, because PHAR uploads are not blocked and are reachable within the phar://../../../../../../../../var/www/html/web/var/assets/ directory, a different vulnerabi...
CVE-2019-16318
PUBLISHED: 2019-09-14
In Pimcore before 5.7.1, an attacker with limited privileges can bypass file-extension restrictions via a 256-character filename, as demonstrated by the failure of automatic renaming of .php to .php.txt for long filenames, a different vulnerability than CVE-2019-10867 and CVE-2019-16317.