The Dark Side Of Wearable Tech Use

Wearable Tech

Wearable technology or gadgets are a category of technological and state-of-the-art devices that can be worn by consumers to monitor and track information with regards to fitness and health. However, while wearable technology is known to have provided many benefits for consumers in the past, recent studies have shown there is a darker side to the technology as well. To understand more about this, let’s take a look at a few downsides of wearable tech use:

Enterprise Security Risks

Technology is ever changing. New gadgets are being introduced and with the inception of Android-powered smartwatches and Apple’s iWatch, it has recently been discovered wearable technology could pose risks for large organizations. In a perfect world, these watches (which are really small GPS-enabled computers) help users receive text notifications and calls on their wrist. But, the downside is these gadgets also have the ability to access enterprise data and applications. Enterprises will be required to regulate their security policies for dealing with employee use of smartwatches that could possibly reveal valuable information about a company.

Wearable Cams = Mass Surveillance

Wearable cams are generally used by the police to record video and audio of their interaction with people. They also capture the action around them and the cams can be clipped on an officer’s epaulette, helmet, collar or sunglasses. The key danger of this technology is the ability of law enforcement agencies to edit the collected videos for unfair use or mass surveillance. As a result, wearable cams may put more innocents in than the real criminals!

Vulnerable to Hacking Attacks

Many wearable devices, including pacemakers, insulin pumps, and glucose monitors, these days can be WIRELESS-ENABLED! As a result, this makes them vulnerable to hacking attacks. In 2011, a research by the Black Hat Security showed how attackers could possibly take control of an insulin pump located half a mile away! Therefore, this poses serious risks for the average Joe and Jane, as any person with cruel intentions could potentially hack an insulin pump to give a lethal dose to the user. Another research demonstrated how wireless protocols installed in pacemakers can be hacked by professionals to deliver a fatal 830-volt shock to any person wearing the device.

Serious Privacy Concerns

Smart eyewear, like Epson Moverio BT-200, Google Glass, and Vuzix M100, allow wearers to record and transmit images of the activities of people in their range of vision. As a result, in the future, these gadgets can be used in contact lenses and prescription glasses, making it difficult to spot them, hence posing serious privacy issues. When coupled with a facial recognition software, like FacialNetwork.com’s recently released NameTag application, “a user can simply glance at someone nearby and instantly see that person’s name, occupation and even visit their Facebook, Instagram or Twitter profiles in real-time,” according to the company. So, it isn’t hard to imagine the risks this technology could pose!

Invasion of Privacy

privacy-emails

GPS-enabled, wearable cameras, like Autographers and Narrative Clip, enable users to virtually document every single moment of their lives and upload it to the device maker’s website. As a result, while the cameras do create a detailed journey of a person’s life, they also invade the privacy of others who are being recorded and photographed without their permission.

What steps are manufacturers taking to prevent these mishaps from happening? Well, there has been no news about that yet. But the fact remains there is a darker side to wearable tech you should be aware of to ensure your safety and privacy.

By Brent Anderson

Jeremy Cioara

Demand for Cloud and AI Skills Continues To Increase

Demand for Cloud Skills Increases Thinking about adding more cloud skills to your repertoire? Stop thinking. The time to do it is now. For IT professionals, cloud computing skills are becoming an essential resume item.  ...
Chandani Patel Volansys

Pillars of AWS Well-Architected Framework

Well-Architected Framework Cloud computing is proliferating each passing year denoting that there are plenty of opportunities. Creating a cloud solution calls for a strong architecture if the foundation is not solid then the solution faces ...
David Friend

Cloud 2.0 will not be Ushered in by AWS or other Cloud Giants

Cloud 2.0 Trends Amazon, Google, and Microsoft are all pursuing similar business strategies: they want it all. ‘It,’ in this case, means the entire IT infrastructure in their cloud. Furthermore, they want you to buy ...
Patrick Joggerst

Payments Companies Will Always See ROI on Embedded Real Time Communications

ROI on Embedded Real Time Communications Without secure, real time communications applications, the financial services industry could literally come to a standstill. While transactions are driven by data, the human voice and human messaging continues ...
Hacker Cloud

Pandemic and Cybersecurity: Top Threats to Businesses

Pandemic and Cybersecurity The worldwide spread of the COVID-19 virus is coming to naught (or at least we hope so). But the impact that this virus produced on the whole world, and specifically on businesses, ...
Chris Collins

How The Cloud Put Customers First During COVID-19

Tech’s True Value in a Crisis One of the cloud’s biggest assets has always been crisis preparedness—because when disaster strikes, you don’t have to worry about the viability of on-premise servers or the availability of ...