CIO Today

CIO Today Network Sites:   Top Tech News  |   CIO Today   |   Mobile Tech Today   |   Data Storage Today
Daily Briefing for Technology's Top Decision-Makers
Vblock™ Systems:
Advanced converged infrastructure
increases productivity & lowers costs.

www.vce.com
Wednesday, April 23rd 
Real-time info services with Neustar
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Trending Topics:   Security Heartbleed Big Data Cloud Computing Windows XP Data Centers OS X Mavericks
Home
Enterprise Software
Enterprise Hardware
Big Data
Network Security
Cloud Computing
CRM Systems
Data Storage
Operating Systems
Communications
CIO Issues
Mobile Tech
Chips & Processors
World Wide Web
Business Briefing
After Hours
Press Releases
 
Free Newsletters
Top CIO News
 
Mobile Tech Today
 

Mobile Tech

Security Firm Cracks Google Glass

Security Firm Cracks Google Glass
July 17, 2013 12:31PM

Bookmark and Share
"We analyzed how to make QR codes based on configuration instructions and produced our own 'malicious' QR codes," said Marc Rogers, principal security researcher at Lookout. When photographed by an unsuspecting Glass user, the code did its mischief successfully, making Glass connect to a "hostile" WiFi access point controlled by Lookout.

APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.

San Francisco security firm Lookout revealed Wednesday that it was able to hack the Google Glass head-mounted system's earlier software and render it vulnerable to malicious code that could, in theory, seize control of data coming from that next big Internet of things.

Google Glass is where you literally just look up information, glancing into the screen and camera in this Web-connected device, to find the information you want. In this instance, Glass was hacked by the image of a malicious QR code.

In a Lookout blog posted on Wednesday, Marc Rogers, principal security researcher, revealed the exploit that his firm performed in May, and said it had immediately alerted Google to the problem.

The source of the hack was the Google Glass QR code. As Rogers put it, Glass looks for data it can recognize when the user takes a photo and the most obvious are QR codes, barcodes that can contain everything from instructions to send an SMS or browse a website to configuration information that change device settings. Google used this capability as an easy way for a user to configure his Glass without having to use a keyboard.

URL Mischief

The scenario that the exploit represents: The Google Glass wearer photographs something with a QR code or link, using the device. However, the code's command is also automatically executed. Without telling or asking the wearer for permission, the device can just open the URL. This is the door the hacker wants, injecting malicious code and links and gaining control of the device.

"We analyzed how to make QR codes based on configuration instructions and produced our own 'malicious' QR codes," he said. When photographed by an unsuspecting Glass user, the code did its mischief successfully, making Glass connect to a "hostile" WiFi access point controlled by Lookout.

The access point enabled the sleuths to spy on the connections Glass made, and it even allowed Lookout to divert Glass to a page on the access point with a known Android vulnerability that hacked Glass as it browsed the page.

Lookout alerted Google when the flaw was discovered in mid-May. Google responded quickly and the issue was fixed with the June 4 release of version XE6. Lookout recommended that Google limit QR code execution to points where the user solicited it.

"Google's changes reflected this recommendation," said Rogers. He credited Google's responsive turnaround as indication of the "depth of Google's commitment to privacy and security for this device."

Security in Post-PC Era

While the Google Glass flaw is fixed, the incident serves as a reminder of where we are in the post-PC era of an Internet of Things, and the new normal in security issues.

Everyday objects are being transformed by added sensors that enable them to interact with the world, processors that enable them to think about it and network interfaces that allow them to talk about it, he stated. New things can be hacked in new ways.

Rogers said, "As we change the nature of things, identifying vulnerabilities and managing updates quickly and efficiently will be paramount. Connected things need to be treated like software when it comes to security."

Tell Us What You Think
Comment:

Name:



 Mobile Tech
1. OnePlus One Boasts Android Weapon
2. Samsung: $2.2B Too Much for Apple
3. Review: Windows Phone Advances
4. Microsoft-Nokia Deal Closes this Week
5. Samsung Data Center Catches Fire




 Most Popular Articles
1. BlackBerry Drops T-Mobile After Nasty Spat
2. Cisco, IBM Launch Internet of Things Consortium
3. Salesforce CRM Gets Industry Specific for Internet of Customers
4. Intel Bets on Cloudera for Big Data Analytics
5. SAP HANA Data Warehouse App Gets Faster Analytics


Have an informed opinion on this story?
Send a Letter to the Editor.
We want to know what you think.
Send us your Feedback.

 Related Topics  Latest News & Special Reports

  Google Maps, Now with Time Travel
  Lessons from Verizon's Threat Report
  NYPD Twitter Campaign Backfires
  Net Gets Faster, But Easier to Attack
  OnePlus One Boasts Android Weapon

 Technology Marketplace
Business Intelligence
Get real-time, cloud-based information services with Neustar.
 
Cloud Computing
Next Generation Data Center Is Here! Vblock™ Systems from VCE
 
Contact Centers
HP delivers the future of the contact center with HP Qfiniti 10.
 
Data Storage
Next Generation Data Center Is Here! Vblock™ Systems from VCE
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Enterprise Hardware
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Hardware
Protect your network with APC Smart-UPS battery backup
 
Network Security
Protect your network with APC Smart-UPS battery backup
 

Network Security Spotlight
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Where Do Web Sites Stand, Post-Heartbleed?
A security firm says the vast majority of Web sites have patched themselves to protect against the Heartbleed bug, but now there are questions raised on the reliability of open-source programs.
 
Navigation
CIO Today
Home/Top News | Enterprise Software | Enterprise Hardware | Big Data | Network Security | Cloud Computing | CRM Systems
Data Storage | Operating Systems | Communications | CIO Issues | Mobile Tech | Chips & Processors | World Wide Web
Business Briefing | After Hours | Press Releases
Also visit these Enterprise Technology Sites
Top Tech News | CIO Today | Mobile Tech Today | Data Storage Today

Services:
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About CIO Today Network | How To Contact Us | Article Reprints | Services for PR Pros (In partnership with NewsFactor) | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 CIO Today. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.