A researcher has flagged a bug in Google's Nest Cam and Dropcam Pro security cameras that allows an attacker within Bluetooth range to stop either device from recording.
Bluetooth range, of course, is exactly where a burglar would be when planning to ransack a home, and with attack code now publicly available, an intruder could knock Google's security cameras off a wireless network for 90 seconds. That mightn't sound so severe, but since the camera is designed to only store recorded footage in the cloud, the loss of connectivity means the device loses its surveillance capabilities for this period.Read more
Google and Levi's first announced Project Jacquard back in June 2015, promising smart clothes that would be capable of interacting with the mobile devices of the wearer.
Almost two years later, the unlikely partnership has now revealed that a smart jacket named the Commuter will be released into the market in the fall, with a price tag of $350. The Commuter jacket was unveiled by Google and Levi's in May of last year at the Google I/O conference as the first product under Project Jacquard. More details regarding the smart clothing was unveiled at SXSW 2017, including its price tag of $350 once it is launched in the fall.Read more
Apple Inc. is weighing an expansion into digital glasses, a risky but potentially lucrative area of wearable computing, according to people familiar with the matter. While still in an exploration phase, the device would connect wirelessly to iPhones, show images and other information in the wearer’s field of vision, and may use augmented reality, the people said.
They asked not to be identified speaking about a secret project. Apple has talked about its glasses project with potential suppliers, according to people familiar with those discussions. The company has ordered small quantities of near-eye displays from one supplier for testing, the people said.Read more
A vulnerability in FitBit fitness trackers first reported to the vendor in March could still be exploited by the person you sit next to on a park bench while catching your breath.
The athletic-achievement-accumulating wearables are wide open on their Bluetooth ports, according to research by Fortinet. The attack is quick, and can spread to other computers to which an infected FitBit connects. Attacks over Bluetooth require an attacker hacker to be within metres of a target device. This malware can be delivered 10 seconds after devices connect, making even fleeting proximity a problem. Testing the success of the hack takes about a minute, although it is unnecessary for the compromise.Read more
This story began a few months ago when I got a popular brand of fitness bracelet. As this is a wearable device I installed Android Wear app, an application developed especially for wearable devices. This application easily connects to the fitness band.
However, there was something odd: the program could connect to a Nike+ Fuel Band SE, but my bracelet was another brand! It wasn't long before I realized my colleague had a Nike wristband – and he didn't even notice I had connected to his device. After that I decided to do some research and find out how secure my wristband was. Smart bracelets: communication with a smartphone.Read more
Anyone who banks online will know how difficult it can sometimes be to remember multiple passwords and pin numbers on a daily basis. Halifax believes it could have a solution: a wristband that identifies customers by their heartbeat.
Apparently everyone has a unique heart rhythm, which can be used to identify us much in the same way as fingerprints. Customers would put the band on their wrists, which measures their electrocardiogram or ECG. The ECG data is read when a customer wears the band on one wrist and touches the top sensor with a finger on the other hand.Read more
Journalists, PR folk, and anyone else who needs accurate copies of calls over the phone or Skype should check out a new Bluetooth headset. Nowadays there are plenty of headsets out there that give you a comfortable fit or decent sound quality compared to the earbuds that come with our phones, the Bluewire actually can even record conversations.
You don’t even have to make your calls and communicate over the headset. As long as it’s paired to your smartphone, it will record both sides of a conversation, even if it takes place over a different headset you find more comfortable or your in-car audio system.Read more
Security experts at BitDefender demonstrated how is possible to access data exchanged between a smartwatch and a smartphone. The paradigm of Internet of Things is influencing modern society and the way it approaches the technology in everyday life.
An impressive amount of Intelligent devices surround us, but often we ignore the repercussion in term of security and privacy. The IoT devices are designed to improve our experience with technology, but we must consider thta they enlarge our surface of attack. Today we will discuss the risk related to the use of a Smartwatch that is able to dialog with an Android smartphone.Read more
Jawbone wants to become a part of the workday. The company's new service, UP for Groups, will sell discounted fitness trackers to corporate customers who buy in bulk and subscribe to a monitoring service that aggregates data from all the devices.
The target: employers who think nudging their workers toward healthier habits is worth the investment. Jawbone already has been circling the workplace market, and some companies have adopted its bracelets as a way to encourage employees to walk more. But it wasn't until this fall, with the release of Jawbone's cheapest tracking device, that there was an inexpensive option for larger orders.Read more
Computers housing the world’s most sensitive data are usually isolated from the internet. They’re also not connected to other systems that are internet-connected, and their Bluetooth feature is disabled, too. Sometimes, workers are not even allowed to bring mobile phones within range of the computers.
All of this is done to keep important data out of the hands of remote hackers. But these security measures may be futile in the face of a new technique researchers in Israel have developed for stealthily extracting sensitive data from isolated machines — using radio frequency signals and a mobile phone. The attack recalls a method the NSA has been secretly using for at least six years to siphon data in a similar manner.Read more