Wearables Open Door to Many Security Vulnerabilities

Wearables Open Door to Many Security Vulnerabilities

The popularity of wearables is growing at a staggering rate, but at what cost?

The popularity of wearables, such as fitness trackers and smart watches, is growing at a staggering rate.  These devices offer convenient and fun platforms to track workouts, check emails, and pay for groceries.  But this all comes at a cost. The security of these wearables is not keeping up, and it provides hackers with another door to users’ accounts, enabling them to steal sensitive personal information, or worse, money from their banking accounts.  

Mike Lynch, the chief strategy officer from InAuth, which provides mobile device security to most of the largest banks in the world, says this may become one of the biggest security issues facing the industry in the coming months and years. These devices are exploding in popularity, and most consumers don’t give much thought to security for them. There is a perception that because it is tethered to a smartphone that the security is already built-in, but that often is not the case. It’s critical that security needs to be built-in to the wearable devices themselves.

Security Today connected with Lynch to get a better understanding of what vulnerabilities there are and how manufacturers can better protect their devices.

What are you expecting or witnessing as far as wearables growth in the market?

Wearable devices are growing in popularity around the world. Estimates from Statista place worldwide numbers to near 1 billion devices within the next few years.

Are there security concerns with wearables?

As app developers race to create wearable-optimized versions of productivity-enhancing tools for personal and business use, and as device manufacturers race to create the latest must-have wearable gadget, security may not keep up with innovation. The increase in the number of native applications available for smartwatches will create new opportunities for fraudsters to compromise wearable devices for access to highly valuable personal information.

What does InAuth do today in the security space, and how do you see future alignment with wearables technology?

InAuth is a leading provider of mobile device authentication solutions, which help organizations facilitate seamless digital transactions. Our technology is used to identify security threats by analyzing the mobile device itself. With wearable devices, there is a high risk for fraud because there has not been much of an industry emphasis on security for wearable devices, at least as compared with smartphones. InAuth can directly address a critical need for this growing market.

Potential threats range from exposure of details of people’s exercise activities (such as their walking paths or running speeds), to the potential compromise of financial information if a consumer is using a wearable device that is enabled to make payments.

What is the potential risk that wearables present for the enterprise environment?

Wearables linked to mobile devices, which are in turn linked to a corporate network, open organizations up to additional risks of attack. Even though the wearable itself may not be the primary target of an attack, its link to a mobile device creates another point of entry for cybercriminals to exploit—especially since wearables security is a relatively a new frontier. Information that can be stolen and exploited includes real-time geolocation information, emails, contacts, and other proprietary information on the device.

What are some of the risks for consumers that use wearables?

From simple fitness trackers that connect to a mobile phone, to stand-alone smartwatches, potentially sensitive personal and sometimes financial information is being passed to the app and to the manufacturer. Users may be asked for access to their files, location, contacts, camera and personal information (age, height, weight, and gender).

What could manufacturers do better to make wearables more secure?

Manufacturers of wearable devices should ensure their information security professionals remain vigilant about mobile device security and acknowledge the unique risks posed by wearable devices. When partnering with security vendors, they should work with those that specialize in both mobile and wearable application security.

To protect paired mobile devices from point-of-entry attacks that originate with wearables, organizations should implement authentication protocols that leverage biometric technology, versus an ID and password combination, which is more easily compromised in mass breaches and susceptible to phishing.

Manufacturers should also invest in digital authentication and fraud prevention solutions. Organizations should seek to authenticate at the device-level to offer the strongest level of identity verification. A mobile phone has thousands of attributes that are part of the device itself and can be used to uncover and analyze risk factors that could lead to potentially fraudulent activities.

What could the wearable user do to better protect themselves?

There are several simple steps that users can take:

  • Opt-in only for the information required for use of the app.
  • Leverage the highest level of security offered, such as biometrics.
  • Practice good password hygiene if passwords must be used, including not reusing passwords across multiple applications and changing passwords periodically.
  • Be knowledgeable about attempts to phish for information from those appearing as their manufacturer. Don’t click on links in emails or texts unless you are sure they are from a trustworthy source.
  • Download software updates when they are available, as many software updates patch known vulnerabilities.

Can you tell us what kind of wearable devices for which you are providing protection?

Those that are tied to major mobile platforms – IOS and Android. We also have wearables that operate independently from the mobile phone on our roadmap.

What specifically does InAuth do to protect wearables?

We provide intelligence on the mobile device itself. We look for the location of the device, whether there are any fraud tools on the device, is there any installed malicious software that is making the device appear to be another device/number (‘spoofing’), is there malware on it, and has the device been jailbroken, which makes them more vulnerable. That takes authentication to a new level and can result in less customer friction, fewer authentication steps, but stronger security and fewer "false positives".

Do you protect just the mobile device the wearable interacts with or do you also protect the wearable device itself?

Today we protect the mobile device, the mobile application data, the consumer, and the client organization using InAuth’s technology by detecting malware and providing intelligence that allows the organization to determine if a digital interaction is a fraudulent attempt or if a consumer’s data is at risk. In the future we may also protect certain wearables that are independent from the mobile device.

Where do you see wearable security going in the future?

There will be more wearables that are not paired with a mobile device. For many wearables that can operate independently from paired mobile devices, the same critical authentication measures are still possible. It is possible to permanently identify a type of wearable device the same way you would a mobile device. It is a matter of gathering the right factors to distinguish the type of device (e.g. smart watch or fitness tracker) and create a unique ID. In addition, other intelligence will be available to assess the risk of the transaction or interaction.

Featured

  • Leveraging IoT and Open Platform VMS for a Connected Future

    The evolution of urban environments is being reshaped by the convergence of Internet of Things (IoT) technology and open platform VMS. As cities worldwide grapple with growing populations and increasing operational complexities, these integrated technologies are emerging as powerful tools for creating more livable, efficient, and secure urban spaces. Read Now

  • Securing the Future

    Two security experts sit down with Security Today’s editor in chief Ralph C. Jensen to discuss what they see emerging and changing over the next several years along with how security stakeholders can harness these innovations into opportunities. Read Now

  • Collaboration Made Easy Using a Work Management Platform

    Effective collaboration between security operators, teams and other departments is critical to the smooth functioning of organizations. Yet, as organizations grow in complexity, it becomes more difficult for teams to coordinate with each other. This is compounded by staffing shortages, turnover and ineffective collaboration tools. Read Now

  • Creating a Safer World

    Managing and supporting locks and door hardware within a facility is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities