Augmented Reality (AR)
Augmented reality is a new technology that is built on computer vision-based perception algorithms to augment audio, video, graphics and additional sensor-based inputs on real-world things utilising the camera of your device.
Mixed Reality (MR)
Mixed reality (MR) is the blend of real and virtual worlds to deliver new platform and illustrations, where physical and digital objects co-exist and interact in real-time.
Extended reality (XR)
Extended reality (XR) is a title referring to all real-and-virtual connected ecosystems and human-machine intercommunications produced by computer technology and wearable computing, where the ‘X’ depicts a variable for any current or future spatial computing technologies.
Virtual Reality (VR)
Virtual reality (VR) introduces to the computer-generated simulation in which a person can interact within an artificial three-dimensional atmosphere employing individual electronic devices, such as special goggles with a screen or gloves fitted with sensors.
Augmented reality applies existent reality and physical objects to trigger computer-generated augmentations over the roof of fact, in real-time. Typically, AR is a technology that lays computer-generated models over a user’s view of the real world. These images usually exert shape as 3D models, videos and information.
With virtual reality, you can play with dolphins. And with augmented reality, you can view a dolphin pop out of your business card. While VR provides an immersive experience, AR offers more liberty for the user and more opportunities for people as it does not need to be a head-mounted display.
Augmented reality (AR) adds digital components to a live view often by using the camera on a smartphone. Precedents of augmented reality events include Snapchat lenses and the game Pokemon Go.
The Wearable computing such as AR, VR, MR and XR:
- Wearable computing can host malware, enabling cameras, gathering data, corrupting work instructions or disrupting operation.
- Steal network credentials running Android and Windows
- Exposing Wi-Fi networks to intrusion
- Utilise the pwned Wearables advancing the lateral movement.
- Cloud-based vulnerabilities such as Azure (Hololens) or Facebook cloud (Oculus Rift)
Pen Testing Wearable computing devices is the utmost importance to your privacy and security of any individual or organisation.
- Wearable computing devices are quite similar to the Internet of Things (IoT) as it has many sensors such as Accelerometer, Gyroscope so on and so forth. Performing hardware testing such as IoT is essential.
- Depending upon the OS such as Android, iOS, Windows, OS Security assessment is vital as well.
- Since most of the wearable computing uses cloud computing such as Microsoft’s Azure, Facebook Cloud, cloud pen testing becomes imperative.
- Network Penetration Testing right from the home/office network routers is and network monitoring is quintessential as well.
- Apps Penetration Testing for your new AR/MR/VR/XR devices is included as well.