• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

Why We Need to Rethink Security for Wearable Tech

Amit Kuntal / 3 min read.
January 29, 2017
Datafloq AI Score
×

Datafloq AI Score: 83.67

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/MIyzk

As ubiquitous computing continues to become the focal point of our daily lives, it is more important than ever to make decisions about the scope of data people unknowingly share. With wearable technology, users are enjoying the comfort that comes through ambient intelligence. However, they also risk potentially exposing their private data to nefarious actors. For example, a hacker may gauge the best time to rob victims while they sleep based on their leaked heartbeat data. Hackers can also use data to discover medical conditions that can be exploited for illegal gains.

Security in wearable technology is different from the precautions people take in other settings. This is due to the increased attack surface exposed by such devices. In 2015, a vulnerability in the Fitbit wristband was disclosed that allowed an attacker to upload malicious code when the device was in close range. The code could then be transferred to any connected computer making other devices vulnerable as well.

Bluetooth is becoming the premier connectivity option for a majority of wearable devices. Unfortunately, Bluetooth is not secure, and it continues to be a weak link in the security chain. Freely available tools, such as Crackle, can be used to crack Bluetooth encryption. A solution could be to move to proprietary connection schemes. However, this would mean sacrificing the ease of use that comes with the universal availability of Bluetooth devices.


Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

Consent

Increased exposure to being spied upon is a major concern with wearable technology. Non-tech oriented people are not expected to know if their smartwatch is listening to all their private conversations. Would they have the same level of comfort if they knew this? There are many parties interested in such data and it should be the utmost priority of the vendor to secure it. There is no reason in this day and age to not use end-to-end encryption on devices. Lawmakers should push for standardized rules that require encryption on all wearable tech. The state itself, however, is one of the parties interested in obtaining such data! Therefore, an honest effort from their side cannot be expected. Users should be aware of this and must demand that this feature is present on a device they deeply integrate into their lives.

Another problem with wearables is their potential to harm the wearer physically. Medical wearables are the most sensitive in this regard. With DDOS attacks increasing both in frequency and intensity over the last few years, it is very probable to witness a hacker knocking off an entire network of medical devices in the future. This would leave patients vulnerable. In 2012, a security researcher named Barnaby Jack showed that it is possible to deliver an 830-volt jolt using a hacked pacemaker. This increased attack surface only adds even more lethal methods to an attackers arsenal. Security guidelines should take into account limiting the power characteristics of devices worn. They should also confirm the standards while assuming the device will be operated at its extreme in case of illegal access. Many problems can be avoided if vendors abandon the workflow of building the device first and thinking about security repercussions later. They should be aware of that fact that when making a pacemaker, it is also a device that can be potentially used in unintended ways. They must adopt the mindset of using Default Deny policy instead of Default Permit.

Fortunately, the doctors working with former US Vice President Dick Cheney had the good sense to disable wireless access to his pacemaker. Others, however, might not be fortunate enough to have a dedicated team worrying for their safety. Therefore, vendors and the security community at large should set baselines for what is the expected behavior of devices in various settings, as well as their recommended communication schemes. Vendors must also identify and isolate weak links in order to limit their impact on consumers.

Categories: Cybersecurity
Tags: hackers, internet of things, IoT, security, wearables

About Amit Kuntal

Amit Kuntal is a blogger and software developer with interests in all things tech. He writes about cloud computing, open source software, system design, and system security best practices. You can find him playing cricket when he is not reading or writing code.

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post

Related Articles

How BlaBlaCar Built a Practical Data Mesh to Support Self-Service Analytics at Scale

March 23, 2023 By Barr Moses

The need for extensive data to make decisions more effectively and quickly

March 23, 2023 By Rosalind Desai

A Beginner’s Guide to Reverse ETL: Concept and Use Cases

March 22, 2023 By Tehreem Naeem

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics application applications Artificial Intelligence BI Big Data business China Cloud Companies company costs crypto Data design development digital engineer environment experience finance financial future Google+ government Group health information machine learning mobile news public research security services share skills social social media software strategy technology

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Related Online Courses

  • Oracle Cloud Data Management Foundations Workshop
  • Fundamental Privacy Acts and Laws
  • Implementing an SAP Solution
More courses

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • How BlaBlaCar Built a Practical Data Mesh to Support Self-Service Analytics at Scale
  • How Blockchain Technology Can Enhance Fintech dApp Development
  • How to leverage novel technology to achieve compliance in pharma
  • The need for extensive data to make decisions more effectively and quickly
  • How Is Robotic Micro Fulfillment Changing Distribution?

Search

Tags

AI Amazon analysis analytics application applications Artificial Intelligence BI Big Data business China Cloud Companies company costs crypto Data design development digital engineer environment experience finance financial future Google+ government Group health information machine learning mobile news public research security services share skills social social media software strategy technology

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

settings

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!