• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Article 1: Cybersecurity And The Explosion Of Augmented Reality (Forbes)

September 8, 2019 by Imran Jordan Kharabsheh 1 Comment

As organizations begin to integrate more sophisticated and innovative technology in their business processes as time goes on, the risk associated with these technologies are also taken on by the organizations. This is why there has been an ever growing significance among corporations to analyze new tech and implement cyber security solutions accordingly, as every additional layer of tech has the potential of opening up an entirely new “landscape of new cybersecurity vulnerabilities”. This article talks about one of the more increasingly common technologies being implemented in order to help increase business process performance, that technology being Augmented Reality. Among the more interesting aspects of the article are its inclusion of known vulnerabilities that organizations and tech companies have had to struggle with in the past, and the solutions they implemented to reduce the risk, if applicable.

Source: https://www.forbes.com/sites/forbestechcouncil/2019/09/06/cybersecurity-and-the-explosion-of-augmented-reality/#21fb4dc43c07

Filed Under: Week 01: Overview Tagged With:

Reader Interactions

Comments

  1. Jaimin Pandya says

    September 10, 2019 at 1:16 pm

    Interesting article Imran. It’s no surprise that with each step forward into the digital realm of things is going to expose new security threats. Augmented Reality is fascinating because it makes the thin line between real and virtual life even thinner. One of the best examples of AR in recent times is the gaming app Pokemon Go which exploded out of nowhere. It definitely opened a whole new can of worms in terms of vulnerabilities because in order to use the app you had to enable your GPS and camera creating new risks. From what I remember, iPhone users had to let the app access everything in your phone from “reading your emails to accessing the Google Drive, access to photos, etc.” Your article explains different aspects very neatly especially the Dark cloud and Wearable Exposure piece.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in