Parents should be wary of all connected toys, expert says

The news comes after a researcher discovered one of Barbie's connected dolls could be hacked

A security expert has warned of the dangers of Wi-Fi enabled toys following the news Barbie dolls can be hacked and used to spy on children.

Hello Barbie can be accessed and a microphone in the product used to listen in on children's conversations, according to security researcher Matt Jakubowski.

The feature, on what is billed as the world's first interactive doll, works in a similar way to Siri on an iPhone or Cortana on a Windows PC. It connects to the internet via Wi-Fi and processes voice recordings before working out a response to a child talking to it.

Jakubowski said the feature was vulnerable to being hacked and could allow hackers to gain information such as the doll's system information, account information, stored audio files as well as direct access to the microphone.

He told NBC that this information could be used to find a person's house or business.

"It's just a matter of time until we are able to replace their servers with ours and have her say anything we want," he warned.

Jakubowski demonstrated how a hacker might be able to take control of data recorded by the toy by overriding privacy features that encrypted audio recordings before being sent over the internet. The information stored could also give information about a home network that hackers could then take over and gain access to other internet devices.

David Emm, principal security researcher at Kaspersky Lab explained that it's not just connected Barbies that can present a security threat this Christmas, but parents should be wary of any toy that canconnect to the internet.

"We live in a connected world, where even our children's toys could become the means for personal data being captured by attackers. It's really important that, when considering such toys this Christmas, parents look beyond the fun aspect of a toy and consider the impact it might have on their child and the wider family."

ToyTalk, the firm behind the technology in Hello Barbie told NBC that the information discovered "does not identify a child, nor does it compromise any audio of a child speaking."

In a blog post, Martin Reddy, Co-founder and CTO of ToyTalk said that Mattel and ToyTalk have invested a "lot of effort to build the safest experience possible for parents and their children."

"As part of that commitment, we are actively engaging the security community to address any concerns. We have initiated a security bug bounty program where security researchers are rewarded for responsibly disclosing potential vulnerabilities to us," he said.

"Concerns about the doll centre mainly around privacy - the fact that secrets entrusted to the doll by a child are shared with Mattel and its partners," Emm added. "There's also the potential risk that such data might fall into the hands of hackers, if the security of Mattel or its partners are breached.

"This issue was highlighted a few days ago when children's toy-maker VTech revealed that a compromise of its systems led to the theft of names, physical addresses, e-mail addresses, security questions and answers, and more data of millions of families worldwide."

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download


Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
Hackers use open source Microsoft dev platform to deliver trojans

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
HPE wins networking contract with Birmingham 2022 Commonwealth Games
Network & Internet

HPE wins networking contract with Birmingham 2022 Commonwealth Games

15 Oct 2021
Veritas Backup Exec 21.3 review: Covers every angle
backup software

Veritas Backup Exec 21.3 review: Covers every angle

14 Oct 2021