Welcome!

Microservices Expo Authors: Liz McMillan, Zakia Bouachraoui, Elizabeth White, Pat Romanski, Yeshim Deniz

Related Topics: Microservices Expo, Mobile IoT, Microsoft Cloud, Agile Computing, Release Management , Cloud Security

Microservices Expo: Article

The Wearable-Gesture Security Risk Danger Zone

At this point it has to be said that, inconveniently but truthfully, new user paradigms always bring security risks

This post is sponsored by The Business Value Exchange and HP Enterprise Services

There are only two certainties in life - death and taxes, said Benjamin Franklin. What the theorist and founding father clearly meant was: There are only three certainties in life - death and taxes and information security changeability.

In the constantly changing dynamic world of malware, viral attacks, spam, phishing, zero days attacks and targeted exploits we know only one thing for sure - tomorrow will bring new insight.

This somewhat generic introduction is merely offered to whet the appetite and suggest that we are on the edge of a new "device paradigm" in the form of a) wearable technology combined with a side order of of b) facial recognition served up with a more meaty portion of c) emerging gesture recognition technology.

New Paradigm, New Risk
At this point it has to be said that, inconveniently but truthfully, new user paradigms always bring security risks.

Just look at what has been happening at Google this month; the firm filed a patent this June detailing facial and gesture recognition technology that has already been (in another form) incorporated into Android in the shape of what was known as a human "liveness check" at the time.

This was Google playing with incorporating "user blinking" into the Jelly Bean release of Android. This means of Human Computer Interaction (HCI) was used to detect if a person is "live" or whether it is just an image of a person being shown to the camera. A user blinks at the camera to prove that they are human.

This so-called "facial landmarking" (it turns out) is easy enough to fool with a simple pair of alternating "dead" and "live" images - one with eyes shut, one with eyes open.

Privacy Is Never Far Away from Security
Google Glass has obviously made plenty of headlines in terms of its newness and wow-factor, but also for the privacy questions it throws up as users suddenly get a face-mounted video camera. Privacy is never far away from security and Google Glass is no exception; these cloud services powered devices will naturally have their own shape of applications and interfaces, which ultimately represent freshly laden snow for the malicious hacker attacker.

This subject demands far more detailed analysis and this is merely an ‘amuse- bouche' of interjected commentary to direct our thinking as these devices start to become commonplace, if they indeed do take off in terms of popularity.

Not many of us are saying, "I got a virus from my glasses," or indeed, "My RFID-enabled sports T-shirt needs rebooting," or even, "My gesture-based password identifier doesn't recognize the silly face I am pulling to try and log in, maybe I have been hacked by a liveness-bot." But these technologies HCI and wearable technologies will very likely form part of the fabric (ouch! no pun intended, sorry) of our next computing landscape. So forewarned is forearmed.

More Stories By Adrian Bridgwater

Adrian Bridgwater is a freelance journalist and corporate content creation specialist focusing on cross platform software application development as well as all related aspects software engineering, project management and technology as a whole.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Microservices Articles
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss how today’s workloads require a new model and a new platform for development and execution. The platform must handle a wide range of rec...
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee A...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app secu...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addresse...
SYS-CON Events announced today that DatacenterDynamics has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY. DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions.
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...