Parents should be wary of all connected toys, expert says

The news comes after a researcher discovered one of Barbie's connected dolls could be hacked

A security expert has warned of the dangers of Wi-Fi enabled toys following the news Barbie dolls can be hacked and used to spy on children.

Hello Barbie can be accessed and a microphone in the product used to listen in on children's conversations, according to security researcher Matt Jakubowski.

The feature, on what is billed as the world's first interactive doll, works in a similar way to Siri on an iPhone or Cortana on a Windows PC. It connects to the internet via Wi-Fi and processes voice recordings before working out a response to a child talking to it.

Jakubowski said the feature was vulnerable to being hacked and could allow hackers to gain information such as the doll's system information, account information, stored audio files as well as direct access to the microphone.

He told NBC that this information could be used to find a person's house or business.

"It's just a matter of time until we are able to replace their servers with ours and have her say anything we want," he warned.

Jakubowski demonstrated how a hacker might be able to take control of data recorded by the toy by overriding privacy features that encrypted audio recordings before being sent over the internet. The information stored could also give information about a home network that hackers could then take over and gain access to other internet devices.

David Emm, principal security researcher at Kaspersky Lab explained that it's not just connected Barbies that can present a security threat this Christmas, but parents should be wary of any toy that canconnect to the internet.

"We live in a connected world, where even our children's toys could become the means for personal data being captured by attackers. It's really important that, when considering such toys this Christmas, parents look beyond the fun aspect of a toy and consider the impact it might have on their child and the wider family."

ToyTalk, the firm behind the technology in Hello Barbie told NBC that the information discovered "does not identify a child, nor does it compromise any audio of a child speaking."

In a blog post, Martin Reddy, Co-founder and CTO of ToyTalk said that Mattel and ToyTalk have invested a "lot of effort to build the safest experience possible for parents and their children."

"As part of that commitment, we are actively engaging the security community to address any concerns. We have initiated a security bug bounty program where security researchers are rewarded for responsibly disclosing potential vulnerabilities to us," he said.

"Concerns about the doll centre mainly around privacy - the fact that secrets entrusted to the doll by a child are shared with Mattel and its partners," Emm added. "There's also the potential risk that such data might fall into the hands of hackers, if the security of Mattel or its partners are breached.

"This issue was highlighted a few days ago when children's toy-maker VTech revealed that a compromise of its systems led to the theft of names, physical addresses, e-mail addresses, security questions and answers, and more data of millions of families worldwide."

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

AOL users are the target of a new phishing campaign
phishing

AOL users are the target of a new phishing campaign

1 Mar 2021
What is cloud-to-cloud backup?
cloud backup

What is cloud-to-cloud backup?

1 Mar 2021
Lazarus APT hacking group is targeting the defense industry
Security

Lazarus APT hacking group is targeting the defense industry

26 Feb 2021
Microsoft open sources CodeQL queries used in Solorigate inquiry
Security

Microsoft open sources CodeQL queries used in Solorigate inquiry

26 Feb 2021

Most Popular

How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021