Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
End of Bibblio RCM includes -->
1/15/2016
01:00 PM
James Kane
James Kane
Slideshows
Connect Directly
Twitter
LinkedIn
RSS
E-Mail

The Internet of Private ‘Things:’ 7 Privacy Missteps

A cautionary tale about the rules of 'Privacy by Design' and seven IoT companies that broke them in recent years.
3 of 8

Privacy as the Default

This should be obvious and will flow naturally if the first principle is followed but it is staggering how often major corporations fail to adhere to it. The tenet is that no action should be required on the part of individuals to protect their privacy; it should be built into the system by default. 

The importance of this principle was starkly demonstrated by Fitbit in 2011. Back then  Fitbit's default setting for profiles was public, meaning that if people chose to log their sexual activity (and a number did) a simple google search would reveal the time, the duration and even the intensity of a given person's lovemaking. Let's see if we can avoid this in 2016. 

(Image Source: Wikimedia) by Tim Bartel from Cologne, Germany, via Wikimedia Commons.

Privacy as the Default

This should be obvious and will flow naturally if the first principle is followed but it is staggering how often major corporations fail to adhere to it. The tenet is that no action should be required on the part of individuals to protect their privacy; it should be built into the system by default.

The importance of this principle was starkly demonstrated by Fitbit in 2011. Back then Fitbit's default setting for profiles was public, meaning that if people chose to log their sexual activity (and a number did) a simple google search would reveal the time, the duration and even the intensity of a given person’s lovemaking. Let’s see if we can avoid this in 2016.

(Image Source: Wikimedia) by Tim Bartel from Cologne, Germany, via Wikimedia Commons.

3 of 8
Comment  | 
Print  | 
//Comments
Threaded  |  Newest First  |  Oldest First
geriatric
geriatric,
User Rank: Moderator
1/19/2016 | 8:57:30 AM
Same Problem You Have
Companies who ignore privacy concerns have the same mentality as those who create and publish ugly pornographic images under the guise of business and industry-relevant articles. Who did your proof-reading - Hugh Hefner, Larry Flynt or Lena Dunham?
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Black Hat USA 2022 Attendee Report
Black Hat attendees are not sleeping well. Between concerns about attacks against cloud services, ransomware, and the growing risks to the global supply chain, these security pros have a lot to be worried about. Read our 2022 report to hear what they're concerned about now.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-37041
PUBLISHED: 2022-08-12
An issue was discovered in ProxyServlet.java in the /proxy servlet in Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0. The value of the X-Forwarded-Host header overwrites the value of the Host header in proxied requests. The value of X-Forwarded-Host header is not checked against the whitelist of ho...
CVE-2022-37042
PUBLISHED: 2022-08-12
Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execu...
CVE-2022-37043
PUBLISHED: 2022-08-12
An issue was discovered in the webmail component in Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0. When using preauth, CSRF tokens are not checked on some POST endpoints. Thus, when an authenticated user views an attacker-controlled page, a request will be sent to the application that appears to b...
CVE-2022-37044
PUBLISHED: 2022-08-12
In Zimbra Collaboration Suite (ZCS) 8.8.15, the URL at /h/search?action accepts parameters called extra, title, and onload that are partially sanitised and lead to reflected XSS that allows executing arbitrary JavaScript on the victim's machine.
CVE-2022-37423
PUBLISHED: 2022-08-12
Neo4j APOC (Awesome Procedures on Cypher) before 4.3.0.7 and 4.x before 4.4.0.8 allows Directory Traversal to sibling directories via apoc.log.stream.