Here’s some jarring news for those who love to automatically tweet and track their exercise, sleep and sex routines. Adherents of “quantified self” might learn more about themselves, but they’re also making it possible for hackers to do the same.
At least that’s what Symantec Corp. says. Using customized Raspberry Pi computers, Symantec’s security experts were able to pick apart numerous glaring holes in fitness trackers and other common wearable gadgets. They found that some devices could easily be tracked geographically, many use applications that send data in easily-hackable plain text format, and others had poor server-side security.
Symantec built its homemade tracker tracking tool using just a Raspberry Pi, with an additional battery pack, a 4GB SD card, Bluetooth 4.0 capability and a little custom written script. The total cost came to just $75. The devices were tested on location in Switzerland and Ireland.
Symantec researchers found that most wearable gadgets transmit a unique media access control (MAC) address, which is common to computing devices. Once a device can be linked to an individual, tracking becomes trivial. Researchers said they didn’t even have to force a remote connection.
Applications running on the devices were even less secure, said Symantec. More than 20 percent of wearables didn’t use any kind of encryption at all when sending data to the cloud. Things weren’t much better from a privacy perspective; many devices also share data with marketing and advertising firms.
Symantec says this just increases the scope for potential data leakage. “In one app that tracks sexual activity, the app makes specific requests to an analytics service URL at the start and end of each session. In its communication, the app passes a unique ID for the app instance and the app name itself as well as messages indicating start and stop of the tracked activity.” So advertisers could literally track your performance in the sack.
Developers were also criticized for their poor privacy polices. Some 52 percent of apps had no privacy policy at all, while others were slammed by Symantec for poorly segregating data at the server side.
“In one example it was possible to browse personal data belonging to other users of the site. In another instance, it was possible for an attacker to upload SQL statements, such as commands to create tables in the database, to the server for execution,” notes the report.
Symantec’s report comes less than a week after HP Fortify published its own study about the Internet of Things’ glaring lack of security. That report found that some 70 percent of popular IoT devices contain vulnerabilities, including weak password protection, insecure apps and unencrypted data transmissions.
Support our mission to keep content open and free by engaging with theCUBE community. Join theCUBE’s Alumni Trust Network, where technology leaders connect, share intelligence and create opportunities.
Founded by tech visionaries John Furrier and Dave Vellante, SiliconANGLE Media has built a dynamic ecosystem of industry-leading digital media brands that reach 15+ million elite tech professionals. Our new proprietary theCUBE AI Video Cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.