{"id":4755,"date":"2014-09-15T10:00:24","date_gmt":"2014-09-15T14:00:24","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=4755"},"modified":"2020-02-26T15:10:22","modified_gmt":"2020-02-26T15:10:22","slug":"same_security_threats_new_devices","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/same_security_threats_new_devices\/4755\/","title":{"rendered":"Same Security Threats, Different Devices: Wearables and Watchables"},"content":{"rendered":"<p>The word \u201cwearable\u201d was once merely an adjective describing an article of clothing that was easy to wear. Now \u201cwearable\u201d refers to a mobile device that users wear on their body, and this latter wearable was a major topic of discussion last week.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/09\/05200158\/Who-is-looking-thru-the-Google-Glass2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4759\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/09\/05200158\/Who-is-looking-thru-the-Google-Glass2.png\" alt=\"Who-is-looking-thru-the-Google-Glass\" width=\"640\" height=\"480\"><\/a><\/p>\n<p>The reason for this topicality is, like last September and the September before that and so on and so forth since the dawn of iPhone, Apple held one of its special look-at-all-of-our-new-things event. This year, the centerpiece of that event was perhaps the most eagerly anticipated wearable since Google Glass: the Apple Watch.<\/p>\n<p>My colleague Alex Savitsky did a nice job of summing up the types of people that anticipate these devices in his analysis of <a href=\"https:\/\/www.kaspersky.com\/blog\/apple-pay\/\" target=\"_blank\" rel=\"noopener nofollow\">security in Apple\u2019s new payment platform<\/a>, but I\u2019d like to revise his three types to these four: the people who stubbornly refuse to buy Apple products as if they were slighted by the late Steve Jobs himself, the people who tweet and blog sardonically about how Apple is the worst from their beloved Macbook Pro with retina display, the people who would buy dirt from Apple and troll your comment section for days if you suggested that Apple\u2019s iDirt is just sort of the same as regular dirt and, finally, people who are just generally excited about a new product with all sorts of interesting uses.<\/p>\n<p>To steal another colleague\u2019s words, this time <a href=\"https:\/\/www.kaspersky.com\/blog\/misunderstanding_the_cloud\/\" target=\"_blank\" rel=\"noopener nofollow\">Peter Beardmore<\/a>, and use them in a totally different context, the \u201cpremium\u201d users pay for all of these flavor-of-the-week products, whether it\u2019s the Apple Watch, Google Glass or a dishwasher that asks you about your day and actually listens when you launch into a diatribe about how no one at work appreciates you, is almost never based on security.<\/p>\n<div class=\"pullquote\">Being based on Android, Glass could inherit known vulnerabilities found in other devices with the same OS<\/div>\n<p>Here\u2019s the problem: innovative devices face traditional threats and are, sometimes, more susceptible to them. Perhaps even worse yet, in time, innovative devices will face innovative threats. And Apple Watch, as its rather Orwellian name suggests, will do just that. It and all the other wearables will watch what you do, gathering information about you and shipping it off to any number of third parties.<\/p>\n<p>Roberto Martinez, a security and malware analysts on Kaspersky Lab\u2019s Global Research and Analysis Team, struck at the core of this issue in a recent Securelist article, examining <a href=\"https:\/\/securelist.com\/blog\/research\/66435\/the-world-at-your-fingertips-and-theirs-too\/\" target=\"_blank\" rel=\"noopener\">the peaks and pitfalls of Google Glass<\/a>.<\/p>\n<p><em>\u201cNew and existing devices have many things in common: they use the same protocols and are interconnected with other devices using similar applications. There is no way around this. Traditional attack vectors are mainly against the network layer in the form of <\/em><a href=\"https:\/\/www.kaspersky.com\/blog\/man-in-the-middle-attack\/\" target=\"_blank\" rel=\"noopener nofollow\"><em>Man-in-The-Middle<\/em><\/a><em> (MiTM), the exploitation of some vulnerability in the operating system, or the applications themselves. Being based on Android, Glass could inherit known vulnerabilities found in other devices with the same OS.\u201d<\/em><\/p>\n<p>Martinez goes on to describe an incredibly simple attack, uncovered initially by the mobile security firm, Lookout. One way Google Glass is tuned to connect to the Internet is through viewing QR codes generated by a special mobile app. When Google Glass sees these codes, it will connect automatically. So, all Lookout had to do was create its own QR code, compel Google Glass to view it, and now the device is paired to a wireless network under the control of a potentially malicious party. This is a perfect example of an old threat (<a href=\"https:\/\/www.kaspersky.com\/blog\/qr-codes-convenient-dangerous\/\" target=\"_blank\" rel=\"noopener nofollow\">malicious QR codes<\/a>) works affectively against a new device.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Wearables like #AppleWatch and #GoogleGlass face the same #security threats as traditional computers<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FCDG3&amp;text=Wearables+like+%23AppleWatch+and+%23GoogleGlass+face+the+same+%23security+threats+as+traditional+computers\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>\u201cA source of potential risks is that unlike a computer or a mobile device, the Glass interface is navigated through \u2018cards\u2019 to scroll through the different applications and settings thus limiting configuration options and in some cases automating certain procedures and functions with little input from the user, as in the case of connecting to a network or sharing information,\u201d Martinez explains. \u201cThis automation opens the door for exploitation by attackers and the compromise of user privacy.\u201d<\/p>\n<p>In a more technical attack in a lab setting, Martinez used a tool to trick a Google Glass device into connecting to a malicious network when it thought it was connecting to a legitimate one. This, he claims, could have implications if a Google Glass user were attempting to connect to a public Wi-Fi port.<\/p>\n<p>In their test, while they acknowledged that a lot of their target\u2019s browsing behavior, like Google searches and other web surfing, was encrypted after they captured it, a decent amount of data came through in plain text.<\/p>\n<p>\u201cWe found enough information in plain text to correlate and piece together the user\u2019s navigation to airlines, hotels, and touristic destination sites and how and where the device was connected. Nothing too sensitive but in some cases useful for when carrying out a profiling job.\u201d<\/p>\n<p>In the end, Martinez noted, security must be considered as a layered approach. Every layer needs to be considered and secured in order to protect user-data.<\/p>\n<p>\u201cIn this case, the network layer could be exposed since the device can connect to public networks but lacks the option for <a href=\"https:\/\/www.kaspersky.com\/blog\/vpns-use\/\" target=\"_blank\" rel=\"noopener nofollow\">VPN<\/a> connections thus insuring traffic can be captured and analyzed,\u201d he reasoned.<\/p>\n<p>\u201cIn coming months, we\u2019ll see wearable devices becoming the next attack targets, highlighting the need to pay special attention to these devices, their capabilities, and the information they handle.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.<\/p>\n","protected":false},"author":42,"featured_media":4758,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[14,800,799,565],"class_list":{"0":"post-4755","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-apple","9":"tag-apple-watch","10":"tag-google-glass","11":"tag-mobile-2"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/same_security_threats_new_devices\/4755\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/same_security_threats_new_devices\/4097\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/same_security_threats_new_devices\/4004\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/same_security_threats_new_devices\/4509\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/same_security_threats_new_devices\/5206\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/same_security_threats_new_devices\/6015\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/same_security_threats_new_devices\/4809\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/same_security_threats_new_devices\/5206\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/same_security_threats_new_devices\/6015\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/same_security_threats_new_devices\/6015\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/apple\/","name":"apple"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4755","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=4755"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4755\/revisions"}],"predecessor-version":[{"id":19126,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4755\/revisions\/19126"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/4758"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=4755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=4755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=4755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}