Suyati Technologies
  • Platforms
    • CRM
      • Salesforce
      • Dynamics
    • CMS
      • Sitecore
      • Drupal
      • Episerver
      • Sitefinity
    • Ecom
      • Magento
      • Sitecore commerce
    • RPA
      • UiPath
    • Analytics
    • Martech
  • Services
    • CX Consulting
    • DSaaS
    • Product Engineering
  • Fluid Solutions
    • Buyer Rhythms Engine
    • Lead Prioritization
    • Customer LifeTime Value
    • Chatbot
    • Account Based Marketing
    • Online Proctoring Solution
  • Intel
    • Blog
    • eBooks
    • Webinars
    • Case Studies
  • About Us
    • Management Team
    • Advisory Board
    • Our Story
    • Testimonials
  • Careers
Suyati Technologies
  • Platforms
    • CRM
      • Salesforce
      • Dynamics
    • CMS
      • Sitecore
      • Drupal
      • Episerver
      • Sitefinity
    • Ecom
      • Magento
      • Sitecore commerce
    • RPA
      • UiPath
    • Analytics
    • Martech
  • Services
    • CX Consulting
    • DSaaS
    • Product Engineering
  • Fluid Solutions
    • Buyer Rhythms Engine
    • Lead Prioritization
    • Customer LifeTime Value
    • Chatbot
    • Account Based Marketing
    • Online Proctoring Solution
  • Intel
    • Blog
    • eBooks
    • Webinars
    • Case Studies
  • About Us
    • Management Team
    • Advisory Board
    • Our Story
    • Testimonials
  • Careers
Suyati Technologies > Blog > Role of security in fitness trackers

Role of security in fitness trackers

by admin September 12, 2016
by admin September 12, 2016 0 comment

security-in-fitness-trackers
Worldwide, the popularity of fitness trackers is growing and in the first quarter of 2016, nearly 20 million fitness trackers have already been sold. A device that looks like a normal watch, but the so called fitness trackers can collect data on their users’ lifestyle and health status to help them with training or losing weight. Many of these collect data on the distance the user runs, measure heart rate and pulse or check if the user is asleep via GPS.
Data collected by fitness trackers have been used as evidence in court trials in the US, as reported by Forbes Magazine in 2014. Police and attorneys have started to recognize wearable devices as the human body’s “black box,” the NY Daily News wrote in April 2016. Some health insurance companies even offer discounts to the insured persons if they provide personal data from their fitness trackers. This prompted Ahmad-Reza Sadeghi, system security professor at the cybersecurity profile area (CYSEC) of TU Darmstadt and his team to scrutinize these devices for their security flaws.  “As these wearables are used by third parties it could attract scammers and fraudsters who may manipulate the tracked data to gain financial benefits or even influence a court trial, says Sadeghi. This makes it all the more important that transmission, processing and storing of the sensitive personal data meet high security standards.
Among the 17 different fitness trackers they examined, only devices from four manufacturers ensured that the data remained intact and unaltered. Although, all cloud-based tracking systems use an encrypted protocol like HTTPS to transfer data, none of the trackers employ end-to-end encryption or other effective tamper protection measures when synchronizing data. Five companies did not provide a possibility to synchronize fitness data with an online service, and store the collected fitness data in plain-text, i.e. un-encrypted and readable by everyone, on the smartphone which introduces a potential risk of unauthorized data leakage should the smartphone be stolen or infected with malware. Read more.
As an inference to the study conducted, Sadeghi suggests third parties to be cautious while taking this data as a supportive evidence, and as a solution to fix these flaws, requests manufacturers to employ stringent technologies in their products.

0 comment
0
FacebookTwitterLinkedinTumblr
previous post
Testing Best Practices to follow in CRM Deployment
next post
Sell smartly with Salesforce Lightning for Outlook

You may also like

Leverage AI to Take your Business to the...

May 17, 2022

Global Capability Centers enable accelerated adoption of technology

May 9, 2022

Best Practices to Get Salesforce Implementation Right the...

April 21, 2022

How to manage legacy systems (Upgrade, Replace, Rebuild)?

April 20, 2022

Tackle Duplication Challenges in Salesforce Effectively

March 24, 2022

What are the Key Takeaways of Salesforce DevOps...

March 22, 2022

Derive Greater Value through Better Hybrid Cloud Management

March 15, 2022

How DevOps can Help Salesforce Develop and Deploy...

March 7, 2022

Six trends that Salesforce has for your enterprise...

February 22, 2022

Harnessing the Power of Cloud Continuum for Your...

February 22, 2022

Leave a Comment Cancel Reply

Save my name, email, and website in this browser for the next time I comment.

Keep in touch

Twitter Linkedin Facebook Pinterest

Recent Posts

  • Leverage AI to Take your Business to the Next Level

    May 17, 2022
  • Global Capability Centers enable accelerated adoption of technology

    May 9, 2022
  • Best Practices to Get Salesforce Implementation Right the Very First Time

    April 21, 2022

Categories

  • Twitter
  • Linkedin
  • Facebook
  • Instagram
  • Platforms
    • CRM
      • Salesforce
      • Dynamics
    • CMS
      • Sitecore
      • Drupal
      • Episerver
      • Sitefinity
    • Ecom
      • Magento
      • Sitecore commerce
    • RPA
      • UiPath
    • Analytics
    • Martech
  • Services
    • CX Consulting
    • DSaaS
    • Product Engineering
  • Fluid Solutions
    • Buyer Rhythms Engine
    • Lead Prioritization
    • Customer LifeTime Value
    • Chatbot
    • Account Based Marketing
    • Online Proctoring Solution
  • Intel
    • Blog
    • eBooks
    • Webinars
    • Case Studies
  • About Us
    • Management Team
    • Advisory Board
    • Our Story
    • Testimonials
  • Careers

© 2022 Suyati Technologies


Back To Top
Suyati Technologies

Popular Posts

  • MongoDB vs. Couchbase

    May 26, 2013
  • 2

    What is Salesforce CRM and What Does it Do?

    February 19, 2014
  • 3

    A step-by-step guide to configuring emails in MS Dynamics CRM

    April 27, 2017
  • 4

    Top 10 ETL Tools for Salesforce Data Migration 2021

    January 4, 2021
  • 5

    What are the Top 3 risks for implementing a CX Program?

    August 30, 2019
© 2022 Suyati Technologies

Read alsox

Does eCommerce Success spell the end of Physical Stores?

February 8, 2016

Why enterprises should not miss the DevOps Enterprise Summit 2017

November 9, 2017

Are CIOs connected with their Businesses?

January 6, 2012
Suyati Logo

Leaving So Soon?

Know more about business technology platforms for your enterprise.

Thank you!

We're glad to have you as part of our community. You'll start receiving updates shortly. Please feel free to contact us anytime with feedback or suggestions.

By continuing to use this website you agree with our use of cookies. Read More Agree