Technologies of virtual and augmented reality are gaining popularity. Virtual reality is used in many areas, including beginning to be used in the field of information and computer security. In addition, virtual reality interfaces are also susceptible to attacks. However, there are still few works on research in this area. This article provides an overview of existing solutions to computer
... [Show full abstract] security problems using virtual and augmented reality interfaces, as well as an overview and classification of the identified threats for these interfaces themselves.