Among other things, Google Glass is bringing to light how wearable computers and the new wave of web-connected objects collectively known as the Internet of Things are introducing new security vulnerabilities to the puzzle of mobile computing.

Google Glass is a pre-production device made for developers. It has bugs, and it has problems, some of which are related to security. That's the main reason why Google distributed the devices among a limited sample group. The company has tasked these developers with discovering and reporting security vulnerabilities in Glass so Google can address them.

And many of these issues are entirely new. For instance, one of the latest problems to be addressed, discovered by Lookout Mobile Security, involves how Glass interprets QR codes when it snaps a picture. QR codes themselves are a fairly new development, and only recently have mobile devices had enough processing power to be able to automatically execute QR code commands in a photograph. Thus for the first time, this has provided malicious folks with the opportunity to gain access to your device through these machine-readable blobs of black and white blocks.

And this is exactly what Lookout found was going on with Google Glass. Through a bad QR code, someone could remotely gain root access to a Glass device and take control of it. They could connect it to a Bluetooth device of their choosing and stream images from its camera to a remote display, all without the wearer's knowledge. Lookout principal researcher Marc Rogers said the implications of such a vulnerability are "fairly serious."

Google has proven quick to respond with important Glass issues, patching the vulnerability within two weeks of Lookout reporting its existence May 16.

As the Internet of Things broadens, Rogers says we'll continue to see new types of vulnerabilities arise. But since these devices are so new, and have increasingly broader capabilities, it's difficult to predict what forms those vulnerabilities will arrive in.