Users of wearables are already voicing concern that hackers want to steal the data generated and transmitted. IT and security leaders need to be concerned, too.
Vulnerable Apps
Especially important is the need for enterprises to only permit the use of wearable devices that have hardened application code and advanced key protection measures, said Sam Rehman, CTO of Arxan Technologies. This is critical in order to defend against reverse-engineering and tampering of an application's code. Without such protections, applications on the wearable devices could be easily manipulated to spy on the enterprise, steal sensitive corporate data, and do other nefarious things.