Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Mobile

    Google Glass Security, Privacy Worries Complicate Wide Adoption

    Written by

    Robert Lemos
    Published August 25, 2013
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      As a Google Explorer, Anthony Pettenon wears his enthusiasm for technology on his face.

      A member of Google’s program to expose its always-on Glass devices to the real world, the sophomore at the University of Tampa in Florida regularly wears the devices to class and out around the city. People are not worried about being around an always-on device, while the convenience and connectedness of the device is just cool, Pettenon says.

      “It is cooler because you are wearing technology, rather than holding it,” Pettenon said. “Things are a lot faster—you can instantly take a picture or video and upload it right away.”

      Yet those same benefits also make the devices more of a privacy and security risk for people and organizations. Google Glass is one of the more well-known examples of the Internet of Things, devices that keep people connected to the Internet as they move about their daily lives. While the increased convenience has sold many people, such as Pettenon, on the benefits of sustained connectivity, technologists and security researchers are warning that there could be serious security and privacy implications.

      At the Black Hat security conference in July, for example, security researcher Brendan O’Connor showed off an inexpensive system of wireless sensors and analysis algorithms that could allow anyone to track the movements of a large number of people around a city by listening for signals from their mobile devices.

      Dubbed CreepyDOL, the system highlights how much information people leak into the digital world just by walking around with a smartphone or tablet. When smartphones search for a wireless access point they send out enough information to be tracked, while a variety of popular applications send out even more personal data without encryption.

      “We are leaking too much data for random reasons,” O’Connor told attendees.

      Many of the users of such technology do not realize how much information they are broadcasting. For Pettenon, for example, there is little difference from the always-on Google Glass device and today’s ever-present smartphones, despite the fact that he is sending out far more photos, video and other data on every aspect of his life.

      “I don’t think the privacy concerns are that great because there are other devices out there that you can do the same exact thing,” Pettenon said.

      Connected devices, such as Google Glass, will only make the problem worse unless steps are taken to prevent leakage. Users still do not recognize that they are carrying around what essentially is a mobile sensor suite.

      Google Glass Security, Privacy Worries Complicate Wide Adoption

      Google Glass and other technologies take that even further by making it easier for the devices to gather data and help the user, said Jerry Irvine, CIO for Chicago-based IT consultancy Prescient Solutions.

      A person wearing a Google Glass device could easily take pictures of sensitive data—say, a boardroom whiteboard—without drawing as much attention to themselves as someone who pulled out a mobile phone or camera, he said.

      “These are the same technologies that we have in mobile phones, but because it’s being worn and you are not drawing attention to yourself as you use it, it is a bigger risk,” he said.

      In addition, there are no technologies that allow users to manage the security of the devices or allow third parties to ban the devices use in certain circumstances, Irvine added. “Organizations are going to have to define what they are going to allow. Whether people can come into their facilities with these devices,” he said.

      While the privacy and information-security aspects of Google Glass and other devices add new problems for enterprise security teams, wearers of the devices must also worry about having such a personal device compromised by malicious hackers.

      In a recent example of the possibilities, mobile-security firm Lookout showed off an attack where a malicious quick-response, or QR, code that could redirect the data from Google Glass through a compromised access point. QR codes are the modern version of bar codes that allow data to be scanned by mobile devices. Google Glass extensively uses QR codes to configure the device. The devices were vulnerable because they would essentially allow any QR code to be used to send information to the device, said Marc Rogers, principal security researcher at Lookout.

      “The user never sees anything at all,” he said. “Glass connects the user to the access point using the QR code and starts sending all of its traffic through that new access point. At that point, if you control the access point, you control the connection.”

      Such attacks, while easily remedied, should cause technologists and early adopters to pause and consider the implications of increasing the ability for digital threats to impact a user. By giving individuals a larger footprint in cyberspace, the Internet of Things opens them to more attacks, Rogers said.

      “As we become increasingly reliant on these devices, as they become more intimately integrated into our lives, we have to take them more seriously from a security perspective,” he said. We must take them “even more seriously than our PCs, because these things have a role in our life 24/7.”

      Robert Lemos
      Robert Lemos
      Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×