Wearables Open Door to Many Security Vulnerabilities

Wearables Open Door to Many Security Vulnerabilities

The popularity of wearables is growing at a staggering rate, but at what cost?

The popularity of wearables, such as fitness trackers and smart watches, is growing at a staggering rate.  These devices offer convenient and fun platforms to track workouts, check emails, and pay for groceries.  But this all comes at a cost. The security of these wearables is not keeping up, and it provides hackers with another door to users’ accounts, enabling them to steal sensitive personal information, or worse, money from their banking accounts.  

Mike Lynch, the chief strategy officer from InAuth, which provides mobile device security to most of the largest banks in the world, says this may become one of the biggest security issues facing the industry in the coming months and years. These devices are exploding in popularity, and most consumers don’t give much thought to security for them. There is a perception that because it is tethered to a smartphone that the security is already built-in, but that often is not the case. It’s critical that security needs to be built-in to the wearable devices themselves.

Security Today connected with Lynch to get a better understanding of what vulnerabilities there are and how manufacturers can better protect their devices.

What are you expecting or witnessing as far as wearables growth in the market?

Wearable devices are growing in popularity around the world. Estimates from Statista place worldwide numbers to near 1 billion devices within the next few years.

Are there security concerns with wearables?

As app developers race to create wearable-optimized versions of productivity-enhancing tools for personal and business use, and as device manufacturers race to create the latest must-have wearable gadget, security may not keep up with innovation. The increase in the number of native applications available for smartwatches will create new opportunities for fraudsters to compromise wearable devices for access to highly valuable personal information.

What does InAuth do today in the security space, and how do you see future alignment with wearables technology?

InAuth is a leading provider of mobile device authentication solutions, which help organizations facilitate seamless digital transactions. Our technology is used to identify security threats by analyzing the mobile device itself. With wearable devices, there is a high risk for fraud because there has not been much of an industry emphasis on security for wearable devices, at least as compared with smartphones. InAuth can directly address a critical need for this growing market.

Potential threats range from exposure of details of people’s exercise activities (such as their walking paths or running speeds), to the potential compromise of financial information if a consumer is using a wearable device that is enabled to make payments.

What is the potential risk that wearables present for the enterprise environment?

Wearables linked to mobile devices, which are in turn linked to a corporate network, open organizations up to additional risks of attack. Even though the wearable itself may not be the primary target of an attack, its link to a mobile device creates another point of entry for cybercriminals to exploit—especially since wearables security is a relatively a new frontier. Information that can be stolen and exploited includes real-time geolocation information, emails, contacts, and other proprietary information on the device.

What are some of the risks for consumers that use wearables?

From simple fitness trackers that connect to a mobile phone, to stand-alone smartwatches, potentially sensitive personal and sometimes financial information is being passed to the app and to the manufacturer. Users may be asked for access to their files, location, contacts, camera and personal information (age, height, weight, and gender).

What could manufacturers do better to make wearables more secure?

Manufacturers of wearable devices should ensure their information security professionals remain vigilant about mobile device security and acknowledge the unique risks posed by wearable devices. When partnering with security vendors, they should work with those that specialize in both mobile and wearable application security.

To protect paired mobile devices from point-of-entry attacks that originate with wearables, organizations should implement authentication protocols that leverage biometric technology, versus an ID and password combination, which is more easily compromised in mass breaches and susceptible to phishing.

Manufacturers should also invest in digital authentication and fraud prevention solutions. Organizations should seek to authenticate at the device-level to offer the strongest level of identity verification. A mobile phone has thousands of attributes that are part of the device itself and can be used to uncover and analyze risk factors that could lead to potentially fraudulent activities.

What could the wearable user do to better protect themselves?

There are several simple steps that users can take:

  • Opt-in only for the information required for use of the app.
  • Leverage the highest level of security offered, such as biometrics.
  • Practice good password hygiene if passwords must be used, including not reusing passwords across multiple applications and changing passwords periodically.
  • Be knowledgeable about attempts to phish for information from those appearing as their manufacturer. Don’t click on links in emails or texts unless you are sure they are from a trustworthy source.
  • Download software updates when they are available, as many software updates patch known vulnerabilities.

Can you tell us what kind of wearable devices for which you are providing protection?

Those that are tied to major mobile platforms – IOS and Android. We also have wearables that operate independently from the mobile phone on our roadmap.

What specifically does InAuth do to protect wearables?

We provide intelligence on the mobile device itself. We look for the location of the device, whether there are any fraud tools on the device, is there any installed malicious software that is making the device appear to be another device/number (‘spoofing’), is there malware on it, and has the device been jailbroken, which makes them more vulnerable. That takes authentication to a new level and can result in less customer friction, fewer authentication steps, but stronger security and fewer "false positives".

Do you protect just the mobile device the wearable interacts with or do you also protect the wearable device itself?

Today we protect the mobile device, the mobile application data, the consumer, and the client organization using InAuth’s technology by detecting malware and providing intelligence that allows the organization to determine if a digital interaction is a fraudulent attempt or if a consumer’s data is at risk. In the future we may also protect certain wearables that are independent from the mobile device.

Where do you see wearable security going in the future?

There will be more wearables that are not paired with a mobile device. For many wearables that can operate independently from paired mobile devices, the same critical authentication measures are still possible. It is possible to permanently identify a type of wearable device the same way you would a mobile device. It is a matter of gathering the right factors to distinguish the type of device (e.g. smart watch or fitness tracker) and create a unique ID. In addition, other intelligence will be available to assess the risk of the transaction or interaction.

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

Featured Cybersecurity

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3