• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

Smartwatch Becomes the New Target of Attackers

Updated on Jul 27, 2015 by Guest Authors

The growing adoption of smart watches has attracted an increasing number of attackers to shift their focus to this new type of devices, known as the wearables.

Likewise, it has become more crucial now than ever before for users to adopt more stringent measures in protecting their information, whether it is being received or transmitted via connected smart watches.

smartwatches

That is based on an HP-commissioned study that found all of the smart watches currently available in the market have inherent security holes in them.

That means your favorite smart watch brands such as the Apple Watch and Android Wear — which also happened to be the widely known wearable devices on the market — could be having the vulnerabilities being referred to by HP.

These wearable devices perform critical functions such as enabling you, the user, to send and receive notifications of incoming messages and control the apps installed in your smartphone, to which the smart watch is paired. Now imagine the disaster when hackers have taken control of your smart watch and maneuver how your personal device works.

Smart watches are also part of the Internet of Things ecosystem, a concept that has also become a hot target for cyber criminals wishing to take control of your home devices and appliances that are connected to the Internet.

The HP study has revealed a wide gap between the rate of adoption of wearable technologies and the efforts of their manufacturers to secure them. HP came up with the conclusion after performing manual tests on ten models of smart watches that HP considered the leading brands in the market.

Some of security flaws discovered in the sample wearables include the lack of authentication, encryption and privacy protection. That means the devices are susceptible to various forms of account harvesting. There was also a marked insufficiency in transport encryption that uses the SSL/TLS protocols. Majority of the devices studied by HP demonstrated vulnerabilities to known attacks.

There was also an evidence that the web interfaces of some of the smart watches have account enumeration issues, which would allow attackers to locate valid user accounts by using tools that are capable of resetting passwords.

HP further found security concerns in the unencrypted firmware updates.

While smart watches bring a whole new functionality to how we live every day, their applications in our daily routines also pose increasingly great threats to our sensitive data. As consumers, you can protect yourselves by disabling smart watch functions and features that could open the door to hackers.

Disclosure: As an Amazon Associate, I earn from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Hohem iSteady Mobile Plus Gimbal Stabilizer Review – Upgrade Your Phone Videography On A Budget

Airdog X5 Air Purifier Review – Is TPA Better Than HEPA Filter?

Welock Touch43 Fingerprint Smart Lock Review

HeyChy Deep Tissue Massage Gun Review

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • Secure Your Home With SECURAM
  • C3STROM ASTRO PRO – An E-Bike with Classic Rebel Motorcycle and Modern Ride
  • Bluetti AC500 & B300S Hit Canada Market During 2023 New Year Sale
  • Hohem iSteady Mobile Plus Gimbal Stabilizer Review – Upgrade Your Phone Videography On A Budget

Copyright © 2023 ยท All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}