• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Security   »   CES: Things to think about with Smartwatches

CES: Things to think about with Smartwatches

  • Posted on:January 6, 2015
  • Posted in:Security
  • Posted by:Christopher Budd (Global Threat Communications)
0

It would seem the Dick Tracy era is finally here.

For decades, the holy grail of modern technology has been the idea of the Dick Tracy watch. Originally debuting in the comic strip in 1946 as a two-way wrist radio that the police detective Dick Tracy and others on the force used to communicate with each other, by 1964 it was upgraded to include video capabilities. In many ways this simple device has been a beacon for what the future could hold in terms of personal technology for decades.

For as long as there have been PCs with increasing computing power and decreasing size, the question has been asked “how far away is the Dick Tracy watch.”

With the advent of smartphones and now the newly developing Internet of Everything/Things (IOE/T), we’ve reached a point where the Dick Tracy watch isn’t just a dream, it’s now a reality.

In the past year, Apple and Samsung have both debuted so-called “smartwatches.” These are devices that you wear on your wrist and can integrate with an iPhone or Android phone respectively though as of this writing, there are no video capabilities for these, yet.

While this first generation of smartphones doesn’t have the video capabilities that Dick Tracy’s watch had, they do boast a number of features that no one in those days could have even imagined. In particular, these first generation smartwatches combine their constant presence on the wearer’s wrist with geolocation service to act as a health and fitness tracker. They also provide support for a host of custom apps which can take further advantage of the watch’s presence on the user’s wrist. For example, Apple includes their Apple Pay electronic wallet capabilities in their device.

We can expect at CES this year to see even more innovations and improvements in smartwatch technology and capabilities. But a key thing that should be present in everyone’s mind with this incredibly powerful technology is what protections are in place on the device and in the cloud for this host of very personal information that these devices can gather. As technology gets closer and closer to our person and is ever more present, the capabilities for the amount and type of data to be collected increases considerably. Ten years ago it was beyond the realm of comprehension that something connected to the internet would be able to measure our sleep and record every step we take (and be able to locate those steps accurately on a map). Today it’s not just a possibility, it’s a reality. And while it’s easy to get lost in the “gee whiz” aura of CES, it’s important to temper that wonder with a measure of skepticism and pragmatism. Because data once gathered cannot be ungathered. And data once lost can never really be recovered.

Please add your thoughts in the comments below or follow me on Twitter; @ChristopherBudd.

Related posts:

  1. Before you put on that “wearable”
  2. Attacking Wearables: Thinking like a security person
  3. Expert offers tips for mobile compliance
  4. Smartwatches create new cybersecurity issues

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Offerings Are FedRAMP Authorized and Available on AWS
  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRN® Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.