WiFi-connected Toys May Stalk Children

WiFi-connected Toys May Stalk Children

I often think about when I was a child and all the cool toys that I had: my Mickey Mouse record player, Sit-n-Spin, paint-with-water books, and enough stuffed animals to open my own store! As simple as those “nostalgic” toys seem, at the time, those were considered high-tec gadgetry.  Now, children have toys that connect directly to the Internet, interact with them in real-time, record what they say and even adapts to their interests. While these toys are “cool,” and probably on every child’s Santa list for Christmas, there are some scary security implications.

The data being collected from children as they innocently play and interact with their toys could be used to conduct market research, advertise new products directly to children and even build profiles of their interests, a profile that could follow them for the rest of their digital lives.

Let’s take Hello Barbie as an example. Developed by ToyTalk, this interactive, Wi-Fi-connected Barbie doll has a microphone, speaker and a small embedded computer, along with Wi-Fi hardware. Press a button on Barbie’s belt buckle and she wakes up, asks a question and then activates the microphone. While the child speaks to Barbie, his or her replies (and any background noise) are being recorded, encoded, encrypted and sent into ToyTalk’s servers. The audio is then processed by voice-recognition software to figure out what was said and how best to reply.

This recorded data is supposedly used to assist Mattel and ToyTalk to improve Barbie’s scripted replies that are in the doll’s backend software. This is all fine and great, making the child’s future experience with the doll even more enriching, but what happens if ToyTalk’s servers get hacked? What happens if your child’s voice falls into an online predator’s hands? What happens if Barbie gets hacked by bad people who start interacting with your child?

All scary thoughts, but rest assured parents, because Barbie will email you weekly or daily, giving highlights about what your child has said and there’s even an app that allows you to specify “off limit” conversation topics.

By the way, whatever happened to teaching our children NOT to talk to strangers?!

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • 91 Percent of Security Leaders Believe AI Set to Outpace Security Teams

    Bugcrowd recently released its “Inside the Mind of a CISO” report, which surveyed hundreds of security leaders around the globe to uncover their perception on AI threats, their top priorities and evolving roles, and common myths directed towards the CISO. Among the findings, 1 in 3 respondents (33%) believed that at least half of companies are willing to sacrifice their customers’ long-term privacy or security to save money. Read Now

  • Milestone Announces Merger With Arcules

    Global video technology company Milestone Systems is pleased to announce that effective July 1, 2024, it will merge with the cloud-based video surveillance solutions provider, Arcules. Read Now

  • Organizations Struggle with Outdated Security Approaches, While Online Threats Increase

    Cloudflare Inc, recently published its State of Application Security 2024 Report. Findings from this year's report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in the software supply chain, increasing number of distributed denial of service (DDoS) attacks and malicious bots, often exceed the resources of dedicated application security teams. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3