Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Mobile Tech
Tame your scariest paperwork. Find Out How
Average Rating:
Rate this article:  
Security Firm Cracks Google Glass
Security Firm Cracks Google Glass

By Nancy Owano
July 17, 2013 12:31PM

    Bookmark and Share
"We analyzed how to make QR codes based on configuration instructions and produced our own 'malicious' QR codes," said Marc Rogers, principal security researcher at Lookout. When photographed by an unsuspecting Glass user, the code did its mischief successfully, making Glass connect to a "hostile" WiFi access point controlled by Lookout.
 



San Francisco security firm Lookout revealed Wednesday that it was able to hack the Google Glass head-mounted system's earlier software and render it vulnerable to malicious code that could, in theory, seize control of data coming from that next big Internet of things.

Google Glass is where you literally just look up information, glancing into the screen and camera in this Web-connected device, to find the information you want. In this instance, Glass was hacked by the image of a malicious QR code.

In a Lookout blog posted on Wednesday, Marc Rogers, principal security researcher, revealed the exploit that his firm performed in May, and said it had immediately alerted Google to the problem.

The source of the hack was the Google Glass QR code. As Rogers put it, Glass looks for data it can recognize when the user takes a photo and the most obvious are QR codes, barcodes that can contain everything from instructions to send an SMS or browse a website to configuration information that change device settings. Google used this capability as an easy way for a user to configure his Glass without having to use a keyboard.

URL Mischief

The scenario that the exploit represents: The Google Glass wearer photographs something with a QR code or link, using the device. However, the code's command is also automatically executed. Without telling or asking the wearer for permission, the device can just open the URL. This is the door the hacker wants, injecting malicious code and links and gaining control of the device.

"We analyzed how to make QR codes based on configuration instructions and produced our own 'malicious' QR codes," he said. When photographed by an unsuspecting Glass user, the code did its mischief successfully, making Glass connect to a "hostile" WiFi access point controlled by Lookout.

The access point enabled the sleuths to spy on the connections Glass made, and it even allowed Lookout to divert Glass to a page on the access point with a known Android vulnerability that hacked Glass as it browsed the page.

Lookout alerted Google when the flaw was discovered in mid-May. Google responded quickly and the issue was fixed with the June 4 release of version XE6. Lookout recommended that Google limit QR code execution to points where the user solicited it.

"Google's changes reflected this recommendation," said Rogers. He credited Google's responsive turnaround as indication of the "depth of Google's commitment to privacy and security for this device."

Security in Post-PC Era

While the Google Glass flaw is fixed, the incident serves as a reminder of where we are in the post-PC era of an Internet of Things, and the new normal in security issues.

Everyday objects are being transformed by added sensors that enable them to interact with the world, processors that enable them to think about it and network interfaces that allow them to talk about it, he stated. New things can be hacked in new ways.

Rogers said, "As we change the nature of things, identifying vulnerabilities and managing updates quickly and efficiently will be paramount. Connected things need to be treated like software when it comes to security."
 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Mobile Tech
1.   Apple Smart Watch Patent Surfaces
2.   iPhone 6: Bad for Apple Tablet Sales?
3.   GoTenna: Work-Thru for Dead Zones
4.   Nokia X Phones Had Identity Crisis
5.   Microsoft Axes Android Phones


advertisement
Android SMS Worm on the Loose
Malware lets bad actors cash in.
Average Rating:
iPhone 6: Bad for Apple Tablet Sales?
Most likely, it will be a huge hit.
Average Rating:
Nokia X Phones Had Identity Crisis
'Gateway' devices didn't resonate.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 
Dropbox for Business Beefs Up Security
Dropbox is upping its game for business users. The cloud-based storage and sharing company has rolled out new security, search and other features to boost its appeal for businesses.
 
34 European Banks Hit by Android-Skirting Malware
Criminals have been finding gaping holes in Android-based two-factor authentication systems that banks around the world are using. The result: 34 banks in four European countries have been hit.
 

Enterprise Hardware Spotlight
Microsoft Makes Design Central to Its Future
Over the last four years, Microsoft has doubled the number of designers it employs, putting a priority on fashioning devices that work around people's lives -- and that are attractive and cool.
 
Contrary to Report, Lenovo's Staying in Small Windows Tablets
Device maker Lenovo has clarified a report that indicated it is getting out of the small Windows tablet business -- as in the ThinkPad 8 and the 8-inch Miix 2. But the firm said it is not exiting that market.
 
Seagate Unveils Networked Drives for Small Businesses
Seagate is out with five new networked attached storage products aimed at small businesses. The drives are for companies with up to 50 workers, and range in capacity from two to 20 terabytes.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.