• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Security and Privacy / Symantec report analyzes personal fitness trackers and security concerns

Symantec report analyzes personal fitness trackers and security concerns

2014-08-01 by Jason

Symantec Security Response prepared a report on wearable fitness devices and found vulnerabilities with the devices and the model of data custodianship.

It wasn’t that long ago that your best way of tracking your activity might be an old-fashioned pedometer that mechanically incremented with each step. The next step was heart rate monitors, GPS watches, and smartphones that have tons of sensors to gather additional and more interesting data. All of these sensors help provide the device with more insight into what you’re actually doing and how your activity is improving your health.

symantec_smartphonesensors

The trend of self tracking is most likely here to stay and will even increase as the wearable technology industry continues to accelerate. The amount of data collected is extensive and requires trusting third parties with information that used to be only disclosed to a doctor. The convenient packaging of all of that data and with people wearing sensors that allow them to be tracked can certainly create some security and privacy concerns as you increase your risk of identity theft, profiling, stalking, or corporate misuse.

symantec_fitnesstracker

Symantec’s introduction of the report provided four take-aways to improve your security and privacy while using fitness tracking devices and apps.

  1. In order to thwart location stalkers when you’re using a wearable device, make sure that you do not include any personally identifiable information, such as your own name. Think of an alias that motivates you. “HalfTigerHalfUnicorn” is a lot more fun than “Sue Smith” anyway, right?
  2. Mitigate the risk of your password being compromised by choosing a complex password unique for this service.
  3. Always check the privacy policy of the apps you download to make sure that you know how your data is being used. Information is key!
  4. While using a mobile phone or tablet, be sure to download Norton Mobile Security to secure your device against mobile threats, and detect apps that share your data with third parties.

You can view the Symantec Security Response about your quantified self (PDF) from the Symantec Security Response blog to read the full details from the report.

Filed Under: Security and Privacy

Trending

  • The results of Pwn2Own 2013
    In Security and Privacy
  • Gmail Helps with your Security Concerns, Pt. 2
    In Media, Security and Privacy
  • Make Firefox Extensions Work for New Versions
    In Software, Tech Solutions

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • Command line to take ownership and change permissions Command line to take ownership and change permissions
  • Creating and editing views in phpMyAdmin Creating and editing views in phpMyAdmin
  • Read the Event Logs on Windows Server Core Read the Event Logs on Windows Server Core
  • How to Purchase Cryptocurrencies? How to Purchase Cryptocurrencies?
  • Top 6 necessary aspects to consider when hiring Angular developers Top 6 necessary aspects to consider when hiring Angular developers
  • Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business
  • Benefits of End-To-End Testing That Will Match Company Expectations Benefits of End-To-End Testing That Will Match Company Expectations
  • 3 Key Features of Pets Health Monitoring Systems 3 Key Features of Pets Health Monitoring Systems
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • How to Purchase Cryptocurrencies?
  • Top 6 necessary aspects to consider when hiring Angular developers
  • Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2023 · Magazine Pro Theme on Genesis Framework · WordPress · Log in