The Dark Side Of Wearable Tech Use

Wearable Tech

Wearable technology or gadgets are a category of technological and state-of-the-art devices that can be worn by consumers to monitor and track information with regards to fitness and health. However, while wearable technology is known to have provided many benefits for consumers in the past, recent studies have shown there is a darker side to the technology as well. To understand more about this, let’s take a look at a few downsides of wearable tech use:

Enterprise Security Risks

Technology is ever changing. New gadgets are being introduced and with the inception of Android-powered smartwatches and Apple’s iWatch, it has recently been discovered wearable technology could pose risks for large organizations. In a perfect world, these watches (which are really small GPS-enabled computers) help users receive text notifications and calls on their wrist. But, the downside is these gadgets also have the ability to access enterprise data and applications. Enterprises will be required to regulate their security policies for dealing with employee use of smartwatches that could possibly reveal valuable information about a company.

Wearable Cams = Mass Surveillance

Wearable cams are generally used by the police to record video and audio of their interaction with people. They also capture the action around them and the cams can be clipped on an officer’s epaulette, helmet, collar or sunglasses. The key danger of this technology is the ability of law enforcement agencies to edit the collected videos for unfair use or mass surveillance. As a result, wearable cams may put more innocents in than the real criminals!

Vulnerable to Hacking Attacks

Many wearable devices, including pacemakers, insulin pumps, and glucose monitors, these days can be WIRELESS-ENABLED! As a result, this makes them vulnerable to hacking attacks. In 2011, a research by the Black Hat Security showed how attackers could possibly take control of an insulin pump located half a mile away! Therefore, this poses serious risks for the average Joe and Jane, as any person with cruel intentions could potentially hack an insulin pump to give a lethal dose to the user. Another research demonstrated how wireless protocols installed in pacemakers can be hacked by professionals to deliver a fatal 830-volt shock to any person wearing the device.

Serious Privacy Concerns

Smart eyewear, like Epson Moverio BT-200, Google Glass, and Vuzix M100, allow wearers to record and transmit images of the activities of people in their range of vision. As a result, in the future, these gadgets can be used in contact lenses and prescription glasses, making it difficult to spot them, hence posing serious privacy issues. When coupled with a facial recognition software, like FacialNetwork.com’s recently released NameTag application, “a user can simply glance at someone nearby and instantly see that person’s name, occupation and even visit their Facebook, Instagram or Twitter profiles in real-time,” according to the company. So, it isn’t hard to imagine the risks this technology could pose!

Invasion of Privacy

privacy-emails

GPS-enabled, wearable cameras, like Autographers and Narrative Clip, enable users to virtually document every single moment of their lives and upload it to the device maker’s website. As a result, while the cameras do create a detailed journey of a person’s life, they also invade the privacy of others who are being recorded and photographed without their permission.

What steps are manufacturers taking to prevent these mishaps from happening? Well, there has been no news about that yet. But the fact remains there is a darker side to wearable tech you should be aware of to ensure your safety and privacy.

By Brent Anderson

Episode 16: Bigger is not always better: the benefits of working with smaller cloud providers
The benefits of working with smaller cloud providers A conversation with Ryan Pollock, VP Product Marketing and Developer Relationships for Vultr.com - Everyone knows who the big players are in the cloud business. But sometimes, ...
Dan Teichman
Cloud-Native Communications Historically, Communication Service Providers (CSPs) networks ran on purpose-built hardware. However, in the early 2000s organizations started to update their infrastructure, moving to virtualization. Now, providers are looking to take the next step, ...
Louis
Real-time Enterprise Software Data Enterprise software startups are capitalizing on real-time data to continually improve revenue, costs, cash flow, marketing, and sales as their business grows. The majority of software startup CEOs spoken with have ...
JK Chelladurai
Maintain telecom tax compliance The Telecommunications industry is one of the most heavily taxed service industries. In countries such as the United States, providers have to keep on top of Federal, State, and District taxes, ...
Gary Taylor
Hybrid Worker Risks Organizations are under pressure to secure their remote workers, but they are also worried about the potential impact on user experience. Can they have it both ways without compromise? The pandemic has ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.