WiFi-connected Toys May Stalk Children

WiFi-connected Toys May Stalk Children

I often think about when I was a child and all the cool toys that I had: my Mickey Mouse record player, Sit-n-Spin, paint-with-water books, and enough stuffed animals to open my own store! As simple as those “nostalgic” toys seem, at the time, those were considered high-tec gadgetry.  Now, children have toys that connect directly to the Internet, interact with them in real-time, record what they say and even adapts to their interests. While these toys are “cool,” and probably on every child’s Santa list for Christmas, there are some scary security implications.

The data being collected from children as they innocently play and interact with their toys could be used to conduct market research, advertise new products directly to children and even build profiles of their interests, a profile that could follow them for the rest of their digital lives.

Let’s take Hello Barbie as an example. Developed by ToyTalk, this interactive, Wi-Fi-connected Barbie doll has a microphone, speaker and a small embedded computer, along with Wi-Fi hardware. Press a button on Barbie’s belt buckle and she wakes up, asks a question and then activates the microphone. While the child speaks to Barbie, his or her replies (and any background noise) are being recorded, encoded, encrypted and sent into ToyTalk’s servers. The audio is then processed by voice-recognition software to figure out what was said and how best to reply.

This recorded data is supposedly used to assist Mattel and ToyTalk to improve Barbie’s scripted replies that are in the doll’s backend software. This is all fine and great, making the child’s future experience with the doll even more enriching, but what happens if ToyTalk’s servers get hacked? What happens if your child’s voice falls into an online predator’s hands? What happens if Barbie gets hacked by bad people who start interacting with your child?

All scary thoughts, but rest assured parents, because Barbie will email you weekly or daily, giving highlights about what your child has said and there’s even an app that allows you to specify “off limit” conversation topics.

By the way, whatever happened to teaching our children NOT to talk to strangers?!

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3