• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Flyy Tech
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
Flyy Tech
No Result
View All Result

Toys behaving badly: How parents can protect their family from IoT threats

flyytech by flyytech
September 9, 2022
Home Security
Share on FacebookShare on Twitter


It pays to do some research before taking a leap into the world of internet-connected toys

The Internet of Things (IoT) is changing the way we live and work. From smart pacemakers to fitness trackers, voice assistants to smart doorbells, the technology is making us healthier, safer, more productive and entertained.

At the same time, it has also provided opportunities for manufacturers to market flashy new toys for our children. The global market for smart toys is set to see percentage growth in the double digits, to exceed US$24 billion by 2027. But when connectivity, data and computing meet, privacy and security concerns are never far away.

Chances are that you, too, are considering buying one of these toys for your children and so encourage their learning and creativity. However, to protect your data and privacy (and your child’s safety!), it pays to do some research before taking a leap into the world of connected toys.

What are smart toys and what are the cyber-risks?

Smart toys have been around for several years. Like any IoT device, the idea is to use connectivity and on-device intelligence to deliver more immersive, interactive and responsive experiences. This could include features like:

  • Microphones and cameras that receive video and audio from the child
  • Speakers and screens to relay audio and video back to the child
  • Bluetooth to link the toy up to a connected app
  • Internet connectivity to the home Wi-Fi router

With this kind of technology, smart toys can go beyond the inanimate playthings most of us grew up with. They have the power to engage children through back-and-forth interaction and even acquire new functionality or behaviors by downloading additional capabilities from the internet.

Unfortunately, manufacturers can skimp on safeguards in the race to market. As a result, their products could contain software vulnerabilities and/or allow insecure passwords. They might record data and send it covertly to third-party, or they could require parents input other sensitive details but then store them insecurely.

When toys go bad

There have been several examples in the past of this happening. Some of the most notorious are:

  • The Fisher Price Smart Toy Bear was designed for children aged 3-8 as “an interactive learning friend that talks, listens, and ‘remembers’ what your child says and even responds when spoken to.” However, a flaw in the connected smartphone app could have enabled hackers to gain unauthorized access to user data.
  • CloudPets allowed parents and their kids to share audio messages via a cuddly toy. However, the back-end database used to store passwords, email addresses and the messages themselves was stored insecurely in the cloud. It was left publicly exposed online without any password to protect it.
  • My Friend Cayla is a child’s doll fitted with smart technology, enabling children to ask it questions and receive answers back, via an internet lookup. However, researchers discovered a security flaw which could allow hackers to spy on children and their parents via the doll. It led the German telecoms watchdog to urge parents to bin the device over privacy concerns. Much the same happened with a smartwatch called Safe-KID-One in 2019.

In Christmas 2019, security consultancy NCC Group ran a study of seven smart toys and found 20 noteworthy problems – including two that were deemed “high risk” and three that were medium risk. It found these common issues:

  • No encryption on account creation and log-in process, exposing usernames and passwords.
  • Weak password policies, meaning users could choose easy-to-guess login credentials.
  • Vague privacy policies, often non-compliant with the US Children’s Online Privacy Protection Rule (COPPA). Others broke the UK’s Privacy and Electronic Communications Regulations (PECR) by passively collecting web cookies and other tracking info .
  • Device pairing (i.e., with another toy or app) was often done vie Bluetooth with no authentication required. This could enable anyone within range to connect with the toy to:
  • Stream offensive or upsetting content
  • Send manipulative messages to the child
  • In some cases (i.e., kids’ walkie talkies) a stranger would only need to buy another device from a store to be able to communicate with children in the area with the same toy.
  • Attackers could theoretically hijack a smart toy with audio capabilities to hack smart homes, by sending audio commands to a voice-activated system (i.e., “Alexa, open the front door”).

How to mitigate the privacy and security risks of smart toys

With smart toys representing a certain degree of security and privacy risks, consider the following best practice advice to counter the threats:

  • Do your research before buying: Check if there’s been negative publicity or research done on the model’s security and privacy credentials.
  • Secure your router. This device is central to your home network and talks to all of your home’s internet-connected devices.
  • Power down devices: When not in use, power the device down to minimize risks.
  • Familiarize yourself with the toy: At the same time, ensure that any smaller children are under supervision.
  • Check for updates: If the toy can receive them, ensure it’s running the latest firmware version.
  • Choose secure connectivity: Ensure that devices use authentication when pairing via Bluetooth and use encrypted communications with the home router.
  • Understand where any data is stored: And what reputation the company has for security.
  • Use strong and unique passwords when creating accounts.
  • Minimize how much data you share: This will reduce your risk exposure if the data is stolen and/or the company is breached.

Smart toys can indeed be educational and entertaining. By ensuring first that your data and kids are safe, you’ll be able to sit back and enjoy the fun.



Source_link

flyytech

flyytech

Next Post
fake ecommerce reviews: Draft framework to counter fake reviews, ratings on ecommerce websites ready

fake ecommerce reviews: Draft framework to counter fake reviews, ratings on ecommerce websites ready

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

NIST Publishes Draft Post-Quantum Cryptography Standards

NIST Publishes Draft Post-Quantum Cryptography Standards

August 27, 2023
Pokemon Scarlet & Violet – What To Do Once You’ve Finished The Game

Pokemon Scarlet & Violet – What To Do Once You’ve Finished The Game

December 3, 2022

Trending.

Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

October 23, 2022
Shop now. Pay later. on the App Store

Shop now. Pay later. on the App Store

February 25, 2023
How To Install Tiny11 for Arm64 on Raspberry Pi 4

How To Install Tiny11 for Arm64 on Raspberry Pi 4

February 19, 2023
Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

September 27, 2022
Hackers behind MGM cyberattack thrash the casino’s incident response

Hackers behind MGM cyberattack thrash the casino’s incident response

September 16, 2023

Flyy Tech

Welcome to Flyy Tech The goal of Flyy Tech is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Cooking
  • Entertainment
  • Fitness
  • Gaming
  • Laptop
  • lifestyle
  • Literature
  • Microsoft
  • Music
  • Podcasts
  • Review
  • Security
  • Smartphone
  • Travel
  • Uncategorized
  • Vlogs

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

Diablo 3’s season 29 demonstrates everything Diablo 4 gets wrong

Diablo 3’s season 29 demonstrates everything Diablo 4 gets wrong

September 24, 2023
4 steps for purple team success

4 steps for purple team success

September 24, 2023

Copyright © 2022 Flyytech.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs

Copyright © 2022 Flyytech.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT