With the introduction of Google Glass, technology has come that much closer to seamlessly bind itself to everyone’s life and change it forever. With the advent of wearable technology, in coming years there may not even be a difference between the virtual and the physical world.

 

Talking about Google Glass, even in its developmental stages, this is a product that promises to change the way we look at our world. First of all, it is literally your virtual world in front of your eyes. You can do everything that you generally use your phone or tablet or computer for – search the internet, send messages to others, take pictures and videos, check mail and publish your information to Google+.

 

But Google Glasses will be capable to do much more than just that. It can be said that it may change the way things have been operated in various fields. It will be able to bring forth amazing advancements in medicine or education for that matter. Surgeons would be able to check a patient’s vital signs along with being able to broadcast their surgeries live to other specialists using the device. Classes in education centres can be made that much more interactive using Google Glass. Not only this, it will be able to help in recognizing wanted criminals immediately which will lead to swift law enforcement.

 

But there is never all good in a picture. Google Glass, with all its promises of making life easier, also poses as a threat to our privacy. Cyber criminals, always a step ahead, can manipulate the device to compromise the safety of the user.

 

Google Glass will have to use the same protocol and will be interconnected with other devices using similar application, which is a common practice among all devices with no alternative as of yet. This leaves it vulnerable to traditional attack vectors, which can take the form of Man-in-The-Middle (MiTM) against the network layer. This leads to exploitation of any vulnerability in the Operating System or the application itself. With Google Glass being based on Android, it is highly likely that the device may inherit vulnerabilities found in other device which use the same OS.

 

Google Glass can connect to the internet through either Bluetooth pairing to a mobile device that can share its data network connection or Wi-Fi with prior configuration of the network via a MyGlass account or mobile app generated QR code. The later poses a threat which was recently put forth by the Security firm Lookout. When you add a network by adding a network name and password, which generates a QR code containing connection setting and establishes an automatic connection to the network when looked through the glass, can be used to mislead you to connect to a fake access point through a dangerous QR. This in turn can then allow attackers to take over network communications and redirect navigation to hostile web pages that would exploit known Android web vulnerability. In these cases we recommend to use jammers which can block WiFi and Bluetooth connect.

 

Also with the Google Glass being able to automatically start certain procedures and functions along with being navigated through “cards” its configuration is hence, limited. This may cause attackers to find an easy door to exploit user’s privacy.

 

Thus, with all the advancement of technology, cyber criminals also advance, putting our privacy in jeopardy. This calls forward developers to look over what they created and making it as tightly guarded to attackers as they can.

 

  • Share/Bookmark