• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech Guide
  • Home Improvement
  • Gadget & Apps
  • News

Android Wear and Apple Watch are missing theft protection features

Updated on May 17, 2015 by Guest Authors

Users of Apple Watch and Android Wear smart watches have every reason to worry about the security of their devices. These wearables appear to be missing protection features to guard against thieves.

It turns out that Apple Watch and Android Wear are built as if to make it easy for thieves to resell the devices. That is so because the devices seem to allow for a quick wiping of sensitive data contained in them, thus the ability of thieves to pair the wearable with other smartphones to be operable anew.

apple-watch

Why would the Android Wear and Apple Watch be the prime target of theft?

Unlike the rest of the Apple family of products, the Apple Watch does not have an activation lock security feature that would prevent any attempt of unauthorized access. Therefore it would be too easy for thieves to reset the device, wipe it clean, gain access even without a security pass and pair it with another Apple device using another Apple ID to log in.

Should you be all the more worried with this? By all means yes. Not only does it make the Apple Watch and Android Wear attractive to thieves, it would expose Apple users to harm in the streets. At as much a price of $1,099, thieves would do anything to snatch an Apple Watch or two.

Similarly, Google’s Android Wear platform is not safe from thieves. It lacks protection features as the Apple Watch. Once a smart watch based on Android Wear is stolen, the thief can reset to the device in just a matter of minutes and pair it with another iPhone after that. What makes this process so easy is the absence of passwords or codes or Google ID requirements, which would otherwise make the device more safe from third-party access.

All the iOS 7 devices have built-in activation lock designed to protect the mobile devices. Apple launched the security feature in 2013 to prevent hackers or thieves from wiping a phone clean by requiring an Apple ID and password from third-party access.

Since then, police authorities have reported a decline in the number of mobile devices stolen. An iPhone now is worthless once it is stolen because all access to the device will be closed by what is called the kill switch feature.

Some Android devices also have this security feature. To give credit to both Android Wear and Apple Watch, they both secure personal information from thieves, unless a sophisticated hacking method is employed.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

Transparent Shaving: The yoose ICE Electric Shaver Review

Makeblock mBot Ranger Review – Learn Scratch Coding with the Robot Kit

LISEN MagSafe CD Phone Holder for Car Review

EPOMAKER CIDOO V65 V2 Wireless Mechanical Keyboard Review

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • Transparent Shaving: The yoose ICE Electric Shaver Review
  • The Hidden Cost of Cryptocurrency: Bitcoin’s Energy and Water Footprint
  • Free Places To Sleep Inside Hong Kong Airport During Long Transits
  • Exploring the WAINLUX K8: A User-Friendly, Fully Enclosed Laser Engraver

Copyright © 2023 ยท All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}