Yan Wang, a member of the research team said Wearable devices can be exploited.
In an internal attack, attackers access embedded sensors in wrist-worn wearable devices through malware.
The malware waits until the victim accesses a key-based security system and sends sensor data back.

Then the attacker can aggregate the sensor data to determine the victims PIN.

