View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
April 22, 2014updated 22 Sep 2016 2:27pm

5 security vulnerabilities found in Google Glass

CBR looks at five exploits already discovered by hackers.

By Amy-Jo Crowley

CBR rounds up five vulnerabilities already found in Google Glass by hackers just a week after Google made the high-tech specs available to the entire public for one day.

1. Jailbreaking


Google Glass wearers could be exposed to jailbreaking techniques, which would allow hackers to gain full access of the headset’s operating system.

"If you jailbreak a device you then run everything as the administrative user versus just a standard user, which gives you a much wider access to the underlining hardware and software characteristics of the platform," explained Lawrence Pingree, a research director and analyst of security technologies at Gartner.

He told CBR: "If you go to a meeting wearing your Google Glass, and a hacker jail breaks a device and malware happens to get on the device, it brings a whole new level to spying."

Jay Freeman, a technology consultant, also known as Saurik, already used an exploit in Android, developed by a hacker called Bin4ry, to gain root access into a version of Google Glass in 2013.

Content from our partners
Sherif Tawfik: The Middle East and Africa are ready to lead on the climate
What to look for in a modern ERP system
How tech leaders can keep energy costs down and meet efficiency goals

"Once the attacker has root on your Glass, they have much more power than if they had access to your phone or even your computer: they have control over a camera and a microphone that are attached to your head," he wrote in a blog.

"A bugged Glass doesn’t just watch your every move: it watches everything you are looking at (intentionally or furtively) and hears everything you do."



Topics in this article :
Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.