Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • IoT Devices: Privacy and Security in Abusive Relationships
  • Data Breach
  • Malware
  • Vulnerabilities

IoT Devices: Privacy and Security in Abusive Relationships

5 years ago Tripwire Guest Authors
IoT Devices: Privacy and Security in Abusive Relationships

A few weeks, ago, technology news site The Verge reported on a new Ring security camera that is in fact a drone that flies around inside your house. Available beginning next year, the ‘Always Home Cam’ is supposed to give its owners a total view of their home without the need for multiple cameras. Those worried about break-ins or other kinds of suspicious activities may like the idea of being a fly on the wall in any room inside the house, even when they’re away from home.

Traditional IoT Security Threats

Security professionals may look at the news from a different lens, that is, by keeping in mind the poor level of security that tends to characterize of the Internet of Things (IoT) including smart home devices like security cameras. Many of these products contain easily exploitable vulnerabilities, including common default passwords. Simultaneously, security researchers’ growing focus on these devices has made more severe vulnerabilities available to a wider audience of hackers.

This isn’t mere innocent fun for the security conference stage. There are many IoT botnets that are currently active, engaged in large-scale distributed denial of service (DDoS) attacks or rented out as proxy networks. Probably more worryingly for device owners was the news reported by Motherboard last year that a hacker broke into a Ring camera installed in a children’s bedroom in Tennessee and spoke with one of the children.

IoT devices have a deservedly bad reputation when it comes to security, but things are improving. Many manufacturers are taking security more seriously, while around the world, new laws have been written or are being debated to mandate certain IoT security practices while banning insecure ones, such as the use of common default passwords.

Don’t Forget About the Data!

Traditional security threats aren’t the only concern for IoT devices. Devices that collect data, such as camera images or location data, typically store this information at a central location somewhere in the cloud. Even if such a server isn’t hackable, it will be a goldmine for law enforcement, governments and intelligence agencies, while the manufacturer may also be tempted to sell the data, possibly in some slightly anonymized form, to data brokers.

Here, too, optimists may note that some of this damage could be mitigated. Laws could put high thresholds to both the access and sale of data. Companies could also be pressured into taking a privacy-first approach and limit the amount of data stored centrally in the first place.

IoT Security and Abuse

But, there is a third kind of security risk that is often overlooked and that can’t be as easily mitigated by legislation or better practices: that of an abusive (ex-)partner or stalker.

For such an abuser, having access to a security camera, especially one that flies around the house, could give them information on their target they wouldn’t have been able to obtain otherwise. Simply knowing they are home could be enough. In other cases, the knowledge of things they weren’t supposed to know, even if innocent in itself, is used by an abuser in a power game: a lot of abuse is about power.

From a traditional security viewpoint, this may seem preventable. The use of strong passwords and, where possible, multi-factor authentication could prevent unwanted access to the account. And one should never let a potential adversary come within close physical proximity to a device.

But that ignores the complexities of abusive relationships. For many abuse survivors, it would simply not be safe to exclude the abuser’s access to their devices. Doing so could escalate the abuse and violence. There are also several ways in which intimate relationships are very different from the ‘relationship’ between a traditional malicious cyber-actor and their victim.

In a paper published earlier this year, Karen Levy (Cornell) and Bruce Schneier (Harvard) looked at the privacy threat within intimate relationships. They noted, for example, how such relationships are often dynamic. Many abusive relationships start out as normal, healthy relationships in which shared access to devices and services is not only not a problem but often very desirable. A traditional threat model doesn’t consider such dynamic relationships.

Another issue is that within relationships, even abusive ones, people often find themselves in the same physical location. Even in bad relationships, shared custody over children might make that necessary. For security, this means that not only the remote threat but also the risk of physical access to change settings or obtain permanent access needs to be considered. The shared knowledge among people who have been in relationships means knowledge-based security questions aren’t always a safe way to keep unwanted people out of accounts.

More than two years ago, the New York Times reported on how smart home technology played a role in a lot of instances of domestic abuse. The problem has since gotten worse.

How Cybersecurity Professionals Can Help

There is no obvious solution to the use of connected devices in abusive relationships. But anyone working with such products, whether as a manufacturer or as a security professional, should inform themselves of the complexities of abusive relationships and understand the role technology plays in them. For this is the privacy threat that could literally cost lives.

So what can you, as a cybersecurity professional do, to reduce the likeliness of smart devices being used to enable domestic abuse?

First, push IoT manufacturers to not only enable privacy by default but to also make sure that this privacy considers the threat from intimate partners. Secondly, support events like Domestic Violence Awareness month by offering support to those organizations working directly or indirectly with survivors. And thirdly and perhaps most importantly, inform yourself of the complexities of domestic abuse and listen to the stories of survivors.


About the Author: Martijn Grooten is a cybersecurity expert based in Europe, who is passionate about making sure the most vulnerable are prioritized when it comes to digital security. Previously the editor of Virus Bulletin, he currently does consulting work for a number of organizations. He is a Special Advisor to the Coalition Against Stalkerware and a Fellow of the Civilsphere Lab.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” IoT Devices: Privacy and Security in Abusive Relationships” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Cloud, Compliance, Encryption, Hacker, High Severity, Malware, Medium Severity, Privacy, TripWire

Continue Reading

Previous 3 Zones that Require Network Security for Industrial Remote Access
Next Quick Heal Supports Windows 10 October 2020 Update

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

5 hours ago [email protected] (The Hacker News)
  • Data Breach

The Buyer’s Guide to AI Usage Control

7 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

8 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

12 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

14 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

1 day ago [email protected] (The Hacker News)

Recent Posts

  • ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
  • The Buyer’s Guide to AI Usage Control
  • Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
  • Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows
  • Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT