While protected from outside intrusion is a big part of securing your home network, a sometimes overlooked aspect of a home network design is the untrusted devices on the inside of your home network proverbial walls. Many devices we enjoy and even rely on can be less inert than you would think. Surveillance cameras are a great example of devices that “phone home” even when we don’t need them to. While we enjoy the service provided by surveillance cameras, having direct access to see your home, animals or property, a typical installation can open you up to prying eyes. Many video surveillance camera systems have technologies to scan your home network and then in turn send that information to a cloud server. It’s not so much the issue of the device and associated manufacture knowing what other devices you use, it’s the fact that hackers can use this information to target known exploits, weak default passwords or vulnerabilities within your home network devices. This behavior is not isolated to only surveillance cameras.
All Things Considered: An Analysis of IoT Devices on Home Networks