Smart Toy Leaked Children's Biographical DetailsAdded: Monday, February 8th, 2016
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, www.extratorrent.cc, 2016
A few months ago, a toymaker Fisher-Price announced it had partnered with a tech company to produce Smart Toy, a stuffed bear that is able to learn a kid’s name. The toy was smart, indeed, but also hackable. According to security researchers, the app used with the Fisher-Price toy had security bugs that would allow hackers to steal its owner’s name, birthdate, gender, and some other personal details. Fisher-Price recommended parents to use the application to enable the toy to better interact with the kid. Fortunately, the company was quick to fix the bug.
Fisher-Price explained they tried to remediate the situation and had no reason to believe that any hacker accessed personal data. Indeed, this security flaw may not be severe. However, the findings of the security researchers reinforce how vulnerable consumers can become when bringing more of their possessions online by making them “smart”. Back in 2015, security flaws were found in a baby monitor and a smart Barbie.
This time, the security bug in the Fisher-Price case was connected to the app that was meant for parents and communicated with servers running the system. Such bugs wouldn’t have gone unnoticed by a more experienced Internet company like Google or Microsoft. However, smart toy appeared to be not interesting for hackers: Fisher-Price said there was no evidence attackers had used the flaws in the wild. On the other hand, the security experts suggested that the hackers could use the bug to harvest information on a target’s family in order to trick them into giving out more data via a phishing attack. Moreover, parents often use a child’s name as password. In its official statement, Fisher-Price announced that no personally identifiable data was leaked.
Monday, February 8th, 2016
|If the hacker has access to the bear they already have access to your child.|
|posted by (2016-02-12 07:24:37)|
|what who hack kids toys reeeellllllyyyyyyyy 2 yars old aren't they just learning there own names so someone is just going to hack something they do not even know|
Thai is messed up
This is unworthy of hacking
Most Popular Stories