We see the ‘cool’ when we wear or operate our smart TVs and watches and all other smart devices we own. But are we aware of how the data is processed in these devices? And where does the data we get or the data that these devices transmit end up? Most, if not all, smart…
Read MoreIn the second post of this series, we discussed the first two types of attacks involving wearables. We will now proceed to the third type of attack, which can be considered the most damaging of the three. High User Risk, Low Feasibility Attacks These attacks are considered the most dangerous but these are also considered…
Read MoreIn the previous post, we talked about the definition and categories of wearables. We will now focus our attention at possible attacks for such devices. The possibility of attacks varies largely, depending on the broad category we are focusing on. The probability of attack will increase depending on where the attack can take place. Conversely,…
Read MoreThe Internet of Everything (also known as Internet of Things) has given rise to new gadget categories in every electronics retailer shop. Smart wearables are rapidly becoming more commonplace than you think. While not everyone has Google Glass, you can bet that a lot of people have fitness trackers and even smart watches. With ‘wearable devices,’…
Read MoreSartorial decisions and technology are often considered two separate, distinct items. However, the surge of wearable “smart” devices has blurred the line between the two. Nowadays, it is common to see people accessorized in pieces of equipment that complement their day-to-day activities. Some might assume that wearable smart devices are complicated futuristic gadgets. However, they…
Read More