HP: 100 per cent of smartwatches have security flaws

Common problem was the data that smartwatches collected was typically sent to up to 10 locations, in some cases.

In a recent security assessment of10 smartwatches and their iOS and Android companion applications, every single watch had at least one significant security flaw, according to a new report from HP Fortify.

One common problem was that the data that smartwatches collected was typically sent to numerous places -- up to 10 locations, in some cases.

"It was going through analytics networks, ad networks, numerous back ends," said Daniel Miessler, head of security research at Palo Alto, Calif.-based HP Fortify. "It's something that consumers probably aren't aware of."

Many of those connections were not encrypted, he added, making a bad situation even worse.

The cloud services that users were aware of, such cloud-based companion apps that had Web-based access, often had security issues themselves.

"We found a few that you could break into with brute force attacks and harvest data," he said.

Another common problem was a lack of a shut-off mechanism.

"If someone picked your watch up off the table, they could get into the watch," he said. And, with that, into whatever apps the watch was currently connected to on your phone, such as email, text messages, and phone calls.

"Half of the watches did not have a pass code," he said.

The security vulnerabilities are only to be expected, said Miessler.

"We're making the same mistakes we've been making for 15 or 20 years, he said. "We're just changing the platforms."

Miessler declined to elaborate on which devices did well or not so well on the test.

"We're in the middle of the disclosure process, so we're not able to comment," he said.

"We're waiting for companies to respond back with patches. Some companies respond quickly, and others don't respond at all. We don't release [vulnerability information] unless they come out with a patch and authorize us to release it."

He warned enterprises to be careful about major roll-outs of smartwatches, and to pay close attention to security vulnerabilities.

He also suggested that if smartwatches are deployed in an corporate setting, that they be restricted to their own networks and not allowed to mingle with enterprise data and services.

He also recommended that enterprises, manufacturers and security testers take a look at the OWASP IoT project page, which lists the 10 most significant IoT security vulnerabilities and suggestions for how to address them.

"It's very early right now," he said. "If someone were to try to use it for authentication, they'd really have to subject it to a strong level of scrutiny. I wouldn't say it's not possible, but in general the state of watch security is very low right now."

End users often choose features and widgets over security, he added, so it might take a while for these issues to be addressed.

In addition to the security problems that smartwatches create unbeknownst to their users, they also offer users more opportunities for inappropriate or even malicious behavior.

Smartwatches are significantly less noticeable than smartphones -- it's easy to forget that people are wearing them.

"It's going to be pretty easy to record a conversation, or snap pictures of slides and bring that data out of the enterprise without being noticed," Miessler said. "We think it's going to be an increasing concern in the future."

Join the CSO newsletter!

Error: Please check your email address.

Tags HPInternet of Thingssecuritymobile securityinternet

More about FortifyHP

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Maria Korolov

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place