The Dark Side Of Wearable Tech Use

Wearable Tech

Wearable technology or gadgets are a category of technological and state-of-the-art devices that can be worn by consumers to monitor and track information with regards to fitness and health. However, while wearable technology is known to have provided many benefits for consumers in the past, recent studies have shown there is a darker side to the technology as well. To understand more about this, let’s take a look at a few downsides of wearable tech use:

Enterprise Security Risks

Technology is ever changing. New gadgets are being introduced and with the inception of Android-powered smartwatches and Apple’s iWatch, it has recently been discovered wearable technology could pose risks for large organizations. In a perfect world, these watches (which are really small GPS-enabled computers) help users receive text notifications and calls on their wrist. But, the downside is these gadgets also have the ability to access enterprise data and applications. Enterprises will be required to regulate their security policies for dealing with employee use of smartwatches that could possibly reveal valuable information about a company.

Wearable Cams = Mass Surveillance

Wearable cams are generally used by the police to record video and audio of their interaction with people. They also capture the action around them and the cams can be clipped on an officer’s epaulette, helmet, collar or sunglasses. The key danger of this technology is the ability of law enforcement agencies to edit the collected videos for unfair use or mass surveillance. As a result, wearable cams may put more innocents in than the real criminals!

Vulnerable to Hacking Attacks

Many wearable devices, including pacemakers, insulin pumps, and glucose monitors, these days can be WIRELESS-ENABLED! As a result, this makes them vulnerable to hacking attacks. In 2011, a research by the Black Hat Security showed how attackers could possibly take control of an insulin pump located half a mile away! Therefore, this poses serious risks for the average Joe and Jane, as any person with cruel intentions could potentially hack an insulin pump to give a lethal dose to the user. Another research demonstrated how wireless protocols installed in pacemakers can be hacked by professionals to deliver a fatal 830-volt shock to any person wearing the device.

Serious Privacy Concerns

Smart eyewear, like Epson Moverio BT-200, Google Glass, and Vuzix M100, allow wearers to record and transmit images of the activities of people in their range of vision. As a result, in the future, these gadgets can be used in contact lenses and prescription glasses, making it difficult to spot them, hence posing serious privacy issues. When coupled with a facial recognition software, like FacialNetwork.com’s recently released NameTag application, “a user can simply glance at someone nearby and instantly see that person’s name, occupation and even visit their Facebook, Instagram or Twitter profiles in real-time,” according to the company. So, it isn’t hard to imagine the risks this technology could pose!

Invasion of Privacy

privacy-emails

GPS-enabled, wearable cameras, like Autographers and Narrative Clip, enable users to virtually document every single moment of their lives and upload it to the device maker’s website. As a result, while the cameras do create a detailed journey of a person’s life, they also invade the privacy of others who are being recorded and photographed without their permission.

What steps are manufacturers taking to prevent these mishaps from happening? Well, there has been no news about that yet. But the fact remains there is a darker side to wearable tech you should be aware of to ensure your safety and privacy.

By Brent Anderson

Juan Pablo Perez Etchegoyen

7 Security and Compliance Considerations for Cloud-Based Business Applications  

Security and Compliance Considerations There’s no doubt on-premises deployments of mission-critical business applications provide more control over data as it resides within the four walls of an organization’s network infrastructure. However, businesses can no longer ...
Johan

Why the digital infrastructure is a matter of national interest!

Digital Infrastructure National Interest When the Internet was born, it promised a form of democracy and guarantee that everybody could be part and setup their company to contribute and make the Internet better. Today - ...
Efficient Dispatch Operations with Spare Location Intelligence for DSPs

Efficient Dispatch Operations with Spare Location Intelligence for DSPs

Digitally transform operations of field technicians, design & planning team to reduce overall MTTR by 45% Most of the Digital Service Providers (DSPs) are struggling with the rising cost of repeat-dispatch and a higher Mean ...
Digital Theft

Cross-Site Scripting – Why Is It A Serious Security Threat For Big Data Applications?

Security Threat And Big Data Applications (Updated August 11th, 2020) IBM, Amazon, Google, Yahoo, Microsoft - and the list goes on. All these leading IT enterprises have been affected by Cross-Site Scripting (XSS) attacks in ...
Bill Schmarzo

Master Machine and Human Learning to Win the Digital Transformation Wars

The “Economies of Learning” are more powerful than the “Economies of Scale” This may be my most powerful concept (outside of the Schmarzo Economic Digital Asset Valuation Theorem and the Big Data Business Model Maturity ...
Kaylamatthews

What Amazon’s Kendra Means for the AI and Machine Learning Future

Amazon's Kendra Learning Future Most people feel a bit astounded when they type a query into Google and get relevant results in milliseconds. They're probably not as impressed when using an enterprise search feature at ...