Home IoT News Wearable Technology is Vulnerable to Cyber Threats
Wearable Technology is Vulnerable to Cyber Threats

Wearable Technology is Vulnerable to Cyber Threats

0
0

The security of the IoT and connected devices is always questioned due to the lack of security protocols. The sensitivity of connected sensors attracts hackers and makes them fragile to cyber-attacks. Therefore, a robust security is essential to mitigate these risks.

Recent research conducted by Binghamton University states – “Wearable technology such as a smart watch can put a user’s password and PIN at stake. The motion sensing signals generated by these devices can be articulated to acquire the personal information.

Experts at Binghamton University tested three different wearables including two smartwatches and a motion cracking device. They used a sophisticated algorithm to crack 5000 key entries made by 20 adults. The test was conducted on different types of keyboards including QWERTY and ATM Style. The result was as expected; they cracked the PINs with 83% accuracy on the first attempt. And more than 90% accuracy in the next three attempts.

The results showed that wearable devices are easily exploitable. Hackers can use advanced technology to track user’s hand movements and gain access to their private accounts. They can do it from a distance location and easily configure security PINs and passwords. To eradicate this problem, experts have suggested the use of advanced sensors such as accelerometer and magnetometers in high-tech wearables.

The accelerometer helps to calculate the distance of the user’s hand from the wearable gadget’s screen. This prevents the hacker to steal the information using a wireless sniffer, which tracks the data sent from your smartwatch to smart device. To hack your wearable, the hacker has to be very close to your device. This increases the security of your PIN and password to a certain level. The technique can also be used to protect full key logger.

Another way to protect your wearable device is to input your passwords from non-wearable devices. Breaking the security protocol of in-hand devices such as smartphones is hard compared to wearable devices. Users can also create some noise in-between the process and prevent hackers from detecting your hand movements.

Fixing the vulnerability of wearable technology is a mammoth task for manufacturers. The security breach of these devices might have severe impacts. Hence, securing wearable technology is not just an option, it is a requirement.