Malwareaware

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 12 August 2013

Google Glass: Another device, another vector for infection.

Posted on 06:16 by Unknown
If you have been paying attention to Google at any point in the past year, you might have heard about a new device called Google Glass. This device will be an advancement in Augmented Reality. It will be a computer that is wearable, and is in the style of a pair of glasses.

While controversy is following the device, mostly based on well founded privacy concerns, there seems to be very little discussion on how hackers will treat the device. This can be bad for users because of the fact that Google Glass is just another platform running Android.

For those of you who have had a Mac and found that it is not invulnerable to malware know this already, but oversight on the security front lead to very big problems sooner or later.

Historically, Trojans have been the malware of choice when Android infection is called for. But this new device might just give hackers the drive to push further along the malware severity scale.

I forecast this because of the wealth of information the controller of the device has. If you are a hacker who has hacked into Google Glass, suddenly you can see all that the victim sees. This can include bank login information, passwords, or embarrassing video which can be used to blackmail you.

And with the sort of info provided by being the eyes of a victim, marketing opportunities are endless. This will make sure that some company will be the first to figure out how to hack into Google Glass. From here, the hacker has four options depending on who the hacker is and what company they are representing, if any.

Option #1: Use the info gathered to stalk victims. It is easy to know where a mark is going to be if you have a schedule in advance.

Option #2: For companies, use the info gathered to deliver targeted ads that are sure to entice the victim. If the victim turned customer stays long enough, that will make the ads worth it.

Option #3: Sell the info to the highest bidder. Companies will pay top dollar for the first class info a hacker gets with Google Glass. And lets not get started on bidding that comes from private citizens.

Option #4: Because a hacker generally now has everything needed, steal the identity of a mark. If you know all you can know about the mark, you can easily pose as the mark and fool most people.

Generally, all the info you need as all there. For even one person, you have the following data:

First Name, Last Name, Location, Home Address, Spending Habits, Diet (or lack thereof), Gender, Passwords, Email Addresses, Phone Numbers, Political Attitudes, General Likes and Dislikes, etc.

This is why I am forecasting major infection of Google Glass. With the tempting platform, it is not a matter of if, but when, Google Glass will first become infected. And at this point, the Glass will be shattered.

Thank You for reading. I invite readers to comment with any questions or comments.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Android | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to remove System Doctor 2014
    There is a new rogue AV making the rounds on the web called System Doctor 2014. For those that have just started reading my blog or for thos...
  • What are Bitcoin Miners?
    For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners ...
  • How to keep spies from monitoring you through your computer or your phone.
    Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretappin...
  • Spotlight on Malware: The Gruel Worm.
    It's been around since Windows 2000, but there still is not a way to remove this worm without formatting the hard drive. I speak of the ...
  • I am going to be a billionaire!
    For those of you that have been reading my blog for some time, you know I like to mess with scammers, fake tech support and the like. But th...
  • Use VBScript to pull a joke on your friends.
    Do you want to play a trick on your friends, family, or coworkers? Well this one's for you. You can make a fake piece of malware on your...
  • Spotlight on Malware: MyDoom
    The MyDoom Windows worm, also known as Novarg, and Shimgapi will be the subject of our focus for this post. The MyDoom worm was first discov...
  • CryptoLocker as of 11/3/2013
    If you have read my other posts on this, you know. But for those of you who do not, there is a piece of ransomware that has been making the ...
  • The Big Game: Who's on our side?
    I recently helped a friend of mine remove malware from their computer when she be one mused on how lonely my job must be. "It must be s...
  • Java: No more coffee for you.
    Odds are that every blogger that has a tight focus on computer security has authored a blog post about Java. So why am I wasting your time? ...

Categories

  • Android
  • History Of
  • iOS
  • Java
  • Macs
  • Passwords
  • Removal Guides
  • Spotlight On Malware
  • The CryptoLocker Saga
  • What Does It Mean?
  • What's in a name?
  • Windows

Blog Archive

  • ▼  2013 (151)
    • ►  November (10)
    • ►  October (5)
    • ►  September (15)
    • ▼  August (22)
      • How to remove the Homeland Security Ransomware.
      • How to Remove Antivirus Defence (Rogue)
      • How to Remove Titan Antivirus 2013 (Rogue)
      • History of Windows: Windows 3.0.
      • Looking for Love.
      • How to remove Antivirus Security Pro. (Rogue)
      • How to remove the Savepath Deals Adware
      • History of Windows: Windows 2.0
      • How to remove 24x7 Help.
      • How to remove the Guardians of the Peace of Irelan...
      • How to remove My Safe PC 2014 (Rogue)
      • History of Windows: Windows 1.0
      • How to remove the Webcake Deals Adware.
      • How to remove Antiviral Factory 2013 (Rogue)
      • How to make someone think they have malware: Batch...
      • How to Remove PC Defender 360 (Rogue)
      • Google Glass: Another device, another vector for i...
      • What are Bitcoin Miners?
      • Why you should not let Google Chrome store your pa...
      • What is Rogue Antivirus Software?
      • How to remove Live Security Professional. (Rogue)
      • Never leave your computer's date on February the 14th
    • ►  July (26)
    • ►  June (17)
    • ►  May (25)
    • ►  April (15)
    • ►  March (7)
    • ►  February (6)
    • ►  January (3)
Powered by Blogger.

About Me

Unknown
View my complete profile