By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    Cross-Site Scripting: The Real WordPress Supervillain
    Cross-Site Scripting: The Real WordPress Supervillain
    1 year ago
    Hackers targeting your smartphone
    1 year ago
    Improved Version of CTB-Locker (Onion Ransomware) Emerges
    1 year ago
    Latest News
    Earn up to $10,000 for Vulnerabilities in WordPress Software
    2 hours ago
    Fake CVE-2023-45124 Phishing Scam Tricks Users Into Installing Backdoor Plugin
    2 hours ago
    Short-URL Services May Hide Threats
    23 hours ago
    Wordfence Intelligence Weekly WordPress Vulnerability Report (November 20, 2023 to November 26, 2023)
    1 day ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    Cloudflare Notification about increase in ransom DDoS threats
    1 year ago
    Windows 11 build 25169 outs with new features
    1 year ago
    How to enable Bluetooth on Windows 11
    1 year ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    10 months ago
    Now you can speed up any video in your browser
    10 months ago
    How to restore access to a file after EFS or view it on another computer?
    10 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    11 months ago
  • How To
    How ToShow More
    Bigger, Better, Cooler in a 2U1N form factor
    Bigger, Better, Cooler in a 2U1N form factor
    3 hours ago
    Vulnerability in crypto wallets created online in the early 2010s
    1 day ago
    Use Windows 11 features to inspire creativity, speed up everyday tasks
    2 days ago
    Windows brings nostalgia to the holidays with the return of Windows Ugly Sweaters, this year featuring the Bliss backdrop
    3 days ago
    Better debugging for Cloudflare Workers, now with breakpoints
    Better debugging for Cloudflare Workers, now with breakpoints
    3 days ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    Telegram Post 655deed262abe
    1 week ago
    The most Important Shortcuts Keys For Computer
    1 year ago
    What’s new in Chrome 88
    1 year ago
    Latest News
    Change screen brightness on Windows 11
    2 hours ago
    How to share Microsoft 365 Family subscription with other people
    2 days ago
    How to enable random MAC address for Wi-Fi on Windows 10
    2 days ago
    How to join Office apps to Microsoft 365 Insider Program
    2 days ago
  • Glossary
  • My Bookmarks
Reading: Forget books, time to burn the dolls
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
Threats

Forget books, time to burn the dolls

Tom Grant
Last updated: 7 October
Tom Grant 4 years ago
Share
6 Min Read

Last week, a coworker shared an interesting article with me from the BBC. It reported that Germans were being told to destroy a connected children’s toy because of hacking concerns.

The Cayla dolls — the villains of the story — are toys equipped with a microphone, a speaker, and a Bluetooth transmitter. If a child asks a Cayla doll a question, it can connect to the Internet to find an answer. But in 2015, researchers found out that the unsecured Bluetooth module can be used by hackers to eavesdrop and spy on children and their parents. That’s why the German Federal Network Agency suggested that parents destroy those toys.

Destroying toys sounds extreme, especially considering that according to the BBC, British officials has a different view of the severity of the threat, with a U.K. based entity noting that the dolls “offer no special risk.”

In comparison, Jochen Homann of the German Federal Network Agency noted:

“Items that conceal cameras or microphones and that are capable of transmitting a signal, and therefore can transmit data without detection, compromise people’s privacy. This applies in particular to children’s toys. The Cayla doll has been banned in Germany. This is also to protect the most vulnerable in our society.”

Unfortunately, this is not the first time that concerns have come up about the toy, and similar complaints were voiced in the United States close to the holidays.

Stranger hacks family's baby monitor and talks to child at night #IoT #kidshttps://t.co/yTuxZMfcGP pic.twitter.com/OfzOkklxDI

— Alex Drozhzhin (@GrzegorzBr) January 14, 2016

We talk a lot about how the IoT is lacking in security and how the IoT-fueled Mirai botnet wreaked havoc on some pretty big websites. We have also talked about how toymakers VTech and Hello Kitty, and even baby monitors, have put kids at risk with exploited devices and breaches — and then there was Hello Barbie, which could potentially be hijacked remotely.

It would be easy to vilify the company that makes the My Friend Cayla doll for the Bluetooth vulnerability, but I won’t this time. It won’t help. Instead I implore parents to think. Think before buying kids items that connect to the Web. Make sure that you know what you are giving up in terms of privacy and data.

We live in an online age: Everything is online, and we know there are places on the Web where you — or anyone — can view things like connected cameras.

What are #IoT search engines Shodan and Censys and what are they capable of? We take a look: https://t.co/mLszoMwAOv pic.twitter.com/D0xCgt700n

— Kaspersky (@kaspersky) February 29, 2016

It’s a parent’s responsibility to keep kids safe. Sure, a doll like Cayla sounds cool, but do you really want it to be spying on your family? Add to that a $50–$60 price tag, plus shipping, and you’re paying a lot to give up privacy.

This will not be the last case of a toy taking too much liberty with app controls and not enough care with security. So what should you do?

This is something that falls under individual preference, but here’s what I like to do when buying toys for my kids or looking at the gifts they receive on birthdays or Christmas:

  1. Decide if the device needs to be online. Usually this is a No for me, but there are some exceptions.
  2. Determine what the app/toy is looking to collect. Some of the sites that we have looked at that tie to our kids toys ask for frightening amount of info: birth date, address, name, sibling names, and geolocation, for example. Identity thieves salivate over this.
  3. See if you can change the default password of the device. Believe it or not, my kids got a toy that could project stories on the ceiling, but it also asked for you to remove Wi-Fi passwords from the network and also let it override your phone security settings because it could not store complex passwords.
  4. Decide your comfort level and if your kids really need the item.
  5. Remember that we are living in a digital age, and all devices and sites with valuable information are targets.
  6. Read reviews and look up security notes on the toy.

I follow all of the above when looking at devices for myself as well.

I see my role as a parent to be there to guide my kids in the right direction. Giving them something that can compromise them in the future does not tick that box. Sometimes we have to be the adults and realize that we are not always cool.


Source: kaspersky.com

Translate this article

TAGGED: Security, Threat, Threats
Tom Grant October 7, 2022 September 30, 2019
Share This Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

Bigger, Better, Cooler in a 2U1N form factor
Bigger, Better, Cooler in a 2U1N form factor
Apps 3 hours ago
Change screen brightness on Windows 11
News 5 hours ago
Earn up to $10,000 for Vulnerabilities in WordPress Software
Earn up to $10,000 for Vulnerabilities in WordPress Software
Wordpress Threats 5 hours ago
Fake CVE-2023-45124 Phishing Scam Tricks Users Into Installing Backdoor Plugin
Fake CVE-2023-45124 Phishing Scam Tricks Users Into Installing Backdoor Plugin
Wordpress Threats 5 hours ago
Short-URL Services May Hide Threats
Threats 1 day ago

You Might Also Like

Bigger, Better, Cooler in a 2U1N form factor
Apps

Bigger, Better, Cooler in a 2U1N form factor

3 hours ago
Earn up to $10,000 for Vulnerabilities in WordPress Software
Wordpress Threats

Earn up to $10,000 for Vulnerabilities in WordPress Software

5 hours ago
Fake CVE-2023-45124 Phishing Scam Tricks Users Into Installing Backdoor Plugin
Wordpress Threats

Fake CVE-2023-45124 Phishing Scam Tricks Users Into Installing Backdoor Plugin

5 hours ago
Threats

Short-URL Services May Hide Threats

1 day ago
Show More

Related stories

Several Critical Vulnerabilities including Privilege Escalation, Authentication Bypass, and More Patched in UserPro WordPress Plugin
BridesMaid – neuron writes toasts For those very occasions when you need to give out a powerful
The other day Yandex pleased us with the announcement of a new Midi station – an excellent reason to listen
REMIX – remixes of pictures from neural networksCreate, share and correct works
How to download Diablo IV for free and absolutely legallyBlizzard has opened a free
Rostelecom employees were forced to abandon Android and iOS in favor of Aurora.
Previous Next

10 New Stories

Vulnerability in crypto wallets created online in the early 2010s
Wordfence Intelligence Weekly WordPress Vulnerability Report (November 20, 2023 to November 26, 2023)
Thrive Theme: Dismiss Tooltip to Privilege Escalation
How To Redirect WordPress from HTTP to HTTPs
Use Windows 11 features to inspire creativity, speed up everyday tasks
How to protect corporate routers and firewalls against hacking
Previous Next
Hot News
Bigger, Better, Cooler in a 2U1N form factor
Change screen brightness on Windows 11
Earn up to $10,000 for Vulnerabilities in WordPress Software
Fake CVE-2023-45124 Phishing Scam Tricks Users Into Installing Backdoor Plugin
Short-URL Services May Hide Threats
10alert.com10alert.com
Follow US
© 10 Alert Network. All Rights Reserved.
  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?