Wearables Open Door to Many Security Vulnerabilities
The popularity of wearables is growing at a staggering rate, but at what cost?
- By Sydny Shepard
- Jul 30, 2018
The popularity of wearables, such as fitness trackers and smart watches, is growing at a staggering rate. These devices offer convenient and fun platforms to track workouts, check emails, and pay for groceries. But this all comes at a cost. The security of these wearables is not keeping up, and it provides hackers with another door to users’ accounts, enabling them to steal sensitive personal information, or worse, money from their banking accounts.
Mike Lynch, the chief strategy officer from InAuth, which provides mobile device security to most of the largest banks in the world, says this may become one of the biggest security issues facing the industry in the coming months and years. These devices are exploding in popularity, and most consumers don’t give much thought to security for them. There is a perception that because it is tethered to a smartphone that the security is already built-in, but that often is not the case. It’s critical that security needs to be built-in to the wearable devices themselves.
Security Today connected with Lynch to get a better understanding of what vulnerabilities there are and how manufacturers can better protect their devices.
What are you expecting or witnessing as far as wearables growth in the market?
Wearable devices are growing in popularity around the world. Estimates from Statista place worldwide numbers to near 1 billion devices within the next few years.
Are there security concerns with wearables?
As app developers race to create wearable-optimized versions of productivity-enhancing tools for personal and business use, and as device manufacturers race to create the latest must-have wearable gadget, security may not keep up with innovation. The increase in the number of native applications available for smartwatches will create new opportunities for fraudsters to compromise wearable devices for access to highly valuable personal information.
What does InAuth do today in the security space, and how do you see future alignment with wearables technology?
InAuth is a leading provider of mobile device authentication solutions, which help organizations facilitate seamless digital transactions. Our technology is used to identify security threats by analyzing the mobile device itself. With wearable devices, there is a high risk for fraud because there has not been much of an industry emphasis on security for wearable devices, at least as compared with smartphones. InAuth can directly address a critical need for this growing market.
Potential threats range from exposure of details of people’s exercise activities (such as their walking paths or running speeds), to the potential compromise of financial information if a consumer is using a wearable device that is enabled to make payments.
What is the potential risk that wearables present for the enterprise environment?
Wearables linked to mobile devices, which are in turn linked to a corporate network, open organizations up to additional risks of attack. Even though the wearable itself may not be the primary target of an attack, its link to a mobile device creates another point of entry for cybercriminals to exploit—especially since wearables security is a relatively a new frontier. Information that can be stolen and exploited includes real-time geolocation information, emails, contacts, and other proprietary information on the device.
What are some of the risks for consumers that use wearables?
From simple fitness trackers that connect to a mobile phone, to stand-alone smartwatches, potentially sensitive personal and sometimes financial information is being passed to the app and to the manufacturer. Users may be asked for access to their files, location, contacts, camera and personal information (age, height, weight, and gender).
What could manufacturers do better to make wearables more secure?
Manufacturers of wearable devices should ensure their information security professionals remain vigilant about mobile device security and acknowledge the unique risks posed by wearable devices. When partnering with security vendors, they should work with those that specialize in both mobile and wearable application security.
To protect paired mobile devices from point-of-entry attacks that originate with wearables, organizations should implement authentication protocols that leverage biometric technology, versus an ID and password combination, which is more easily compromised in mass breaches and susceptible to phishing.
Manufacturers should also invest in digital authentication and fraud prevention solutions. Organizations should seek to authenticate at the device-level to offer the strongest level of identity verification. A mobile phone has thousands of attributes that are part of the device itself and can be used to uncover and analyze risk factors that could lead to potentially fraudulent activities.
What could the wearable user do to better protect themselves?
There are several simple steps that users can take:
- Opt-in only for the information required for use of the app.
- Leverage the highest level of security offered, such as biometrics.
- Practice good password hygiene if passwords must be used, including not reusing passwords across multiple applications and changing passwords periodically.
- Be knowledgeable about attempts to phish for information from those appearing as their manufacturer. Don’t click on links in emails or texts unless you are sure they are from a trustworthy source.
- Download software updates when they are available, as many software updates patch known vulnerabilities.
Can you tell us what kind of wearable devices for which you are providing protection?
Those that are tied to major mobile platforms – IOS and Android. We also have wearables that operate independently from the mobile phone on our roadmap.
What specifically does InAuth do to protect wearables?
We provide intelligence on the mobile device itself. We look for the location of the device, whether there are any fraud tools on the device, is there any installed malicious software that is making the device appear to be another device/number (‘spoofing’), is there malware on it, and has the device been jailbroken, which makes them more vulnerable. That takes authentication to a new level and can result in less customer friction, fewer authentication steps, but stronger security and fewer "false positives".
Do you protect just the mobile device the wearable interacts with or do you also protect the wearable device itself?
Today we protect the mobile device, the mobile application data, the consumer, and the client organization using InAuth’s technology by detecting malware and providing intelligence that allows the organization to determine if a digital interaction is a fraudulent attempt or if a consumer’s data is at risk. In the future we may also protect certain wearables that are independent from the mobile device.
Where do you see wearable security going in the future?
There will be more wearables that are not paired with a mobile device. For many wearables that can operate independently from paired mobile devices, the same critical authentication measures are still possible. It is possible to permanently identify a type of wearable device the same way you would a mobile device. It is a matter of gathering the right factors to distinguish the type of device (e.g. smart watch or fitness tracker) and create a unique ID. In addition, other intelligence will be available to assess the risk of the transaction or interaction.