Smart WatchWho do you know with one of the smart, sleek, new smartwatches? Ohhh. So Cool! And so vulnerable to hacking. More so than a smartphone or a tablet.

Why?

A recent article in the Christian Post explains. According to a recent study by Dr. Frank Breitinger, associate director of the University of New Haven Cyber Forensics Research and Education Group in Connecticut, there is a “lack of encryption and an unsecure authentication system” in all the smartwatches they tested.

In the study they tried to infiltrate the devices to get a variety of information such as emails, calendars, messages, health, fitness and financial data. In all cases, if the information was on the device, they were able to get it!

Computer forensics experts like those at International Investigators warn people all the time about keeping their devices secure with passwords and vigilance. But with the smartwatches, apparently, the data is even easier to get.

Cell phone forensics are often conducted with the intent of cell phone spyware detection. The article did not say whether the hacking and data uncovered was the result of spyware having been installed on the watch or not.

Cell phone spying is accomplished through malware being installed on the phone and then accessed remotely by the bad guy. Computer forensic investigators say the same is true for computers and the solution is spyware removal. Generally that means the bad guy has either had access to the device or has sent a file embedded in an email, photo or other file that immediately is installed when the file is opened.

It’s unclear whether there would be a need for spyware detectors on the smartwatch, which is an alarming thought.

Before you consider the purchase of a smartwatch, conduct the research and due diligence necessary to determine if the device is a “smart” purchase. You never know when you are vulnerable to bad guys and this device might make you even more so.

As computer digital forensics and mobile phone forensic analysis experts, we are always ready and able to help with forensic data recovery and spyware removal if you need us. However, precaution at the outset of a purchase may well be your first line of defense.

Ask yourself, “Is it worth the risk?”

-T. Wilcox, CEO, International Investigators