Let us examine the two cyber fashion segments in turn, to raise awareness of the potential cyber risks involved.

  • Techwear

    “Techwear”, also known as “tech clothing” combines high functionality, durability, and modern design with technological innovations such as waterproof, breathable materials; built-in LED lighting (for safety at night); smartphone-controlled heating elements; and adaptive materials that react to environmental conditions.

    And here is where the problem starts: any connected device, including smart clothing, can be hacked. Real-world examples show that even seemingly harmless devices like smart light bulbs and other smart devices can be compromised.

    The risks escalate when smart tech is used in military contexts. There are now textiles that change their appearance in response to the strength of the ambient wind, temperature, or pressure. Such clever camouflage elements could have uses in the military, but interference with the heating elements or adaptive camouflage could have serious consequences, potentially being weaponized against wearers.

  • Wearable technology

    Worn together with clothing and accessories, devices of this genre include smartwatches, fitness trackers, and smart rings that track physical activity, health data, and facilitate contactless payments. These devices, with access to sensitive information, are prime targets for cybercriminals.

    Stolen data can be exploited for personalized attacks or sold on the Dark Net. Hackers could use stolen exercise data to craft convincing phishing schemes, convincing their potential victims to fall for identity scams. Data from biometric sensors built into clothing can supply health metrics (heart rate, breathing, and muscle activity) which hackers can modify to trick wearers into thinking they are in danger… unless they visit a supplied (malicious) URL to seek help. Worse, hackers could hijack certain critical medical devices (such as connected pacemakers), demanding ransoms to restore functionality. Even seemingly routine devices such as smart glasses or contact lenses could be hacked to distort a wearer’s vision, severely disrupting the device’s functionality for various agendas.

    Also, connected microphones and speakers embedded into clothing could be hacked for eavesdropping. Imagine if hackers or business competitors find a way to eavesdrop and spy on high-profile victims to steal trade secrets and insider information.

    Similarly, smart devices that enable payments are particularly vulnerable, making them attractive targets for financial theft.

Peter Kovalcik, Regional Director, Security Engineering (Eastern Europe), Check Point