Users of wearables are already voicing concern that hackers want to steal the data generated and transmitted. IT and security leaders need to be concerned, too.
Remote Recordings
Everything an insider can do with cameras and microphones can be done by a hacker if malware is installed, according to Chris Camejo, director of threat and vulnerability analysis for NTT Com Security. We’ve seen this kind of recording capability built into smartphone malware packages, and it’s not a stretch to imagine it will be incorporated into malware for wearable devices when that type of malware starts to appear in the wild.
Everything an insider can do with cameras and microphones can be done by a hacker if malware is installed, according to Chris Camejo, director of threat and vulnerability analysis for NTT Com Security. We’ve seen this kind of recording capability built into smartphone malware packages, and it’s not a stretch to imagine it will be incorporated into malware for wearable devices when that type of malware starts to appear in the wild.
Wearable devices may be putting many enterprise security professionals on their heels; they are the newest challenge in a BYOD workplace. These devices increase the attack surface and could become vulnerable targets that could allow unauthorized access to an enterprise's sensitive information. Defining tight enterprise security policies for the use of wearables and their access to corporate data is essential.
Let’s take a look at what security professionals think are the most serious weaknesses that wearable computing devices are introducing into networks.