sb-nz logo
Story image

Sex toys and cyber crims, oh my

With practically everything connected to the internet these days, cyber criminals have access to almost anything in your home, car and office.

Last year we saw reports of Barbie dolls with Wi-Fi capability being able to be hacked, as well as medical equipment and machinery. 

And now, special toys in your bedroom are no longer immune to such invasion, according to a demonstration from software firm Trend Micro at a recent news conference.

According to Reuters, Trend Micro spokesperson Udo Schneider placed a large, neon-pink vibrator on the desk in front of him and then proceeded to bring it to life by typing out a few lines of code on his laptop.

While attendees may have giggled, the demonstration had a sobering message. 

"If I hack a vibrator it's just fun," Raimund Genes, chief technology officer at Trend Micro, explained. "But if I can get to the back-end, I can blackmail the manufacturer."

Last year, security services firm Pen Test Partners warned consumers that certain brands of bedroom products could be easily hacked, allowing cyber criminals to intercept communications and control them. Video could also be easily accessed.

'Apparently 'cyberdildonics' are set to be the next big thing in sex toys, allowing you to share 'sensations' across the internet,' Joe Bursell of Pen Test partners said at the time. “There is no shortage of products from various manufacturers, and even a social media site where you can get some random who you’ll probably never meet to ‘drive’ your sex toy for you.” “If an attacker could intercept the devices communications they could portray their victim as a monumentally inept in the stimulation department, which would be hilarious and tragic in equal measure,” Bursell explains.

Story image
Why organisations should rethink the approach to retail demand planning and forecasting
Why organisations should rethink the approach to retail demand planning and forecastingMore
Story image
Thycotic releases new integrations to bolster account governance
“Service accounts are often left defenceless, even by enterprises with established programs for privileged user security."More
Story image
Microsoft Exchange breach a wake-up call to ditch the server
"There are owners who still have in-house exchange servers because they are suspicious of the cloud or have concerns about their data sovereignty or don't want to contemplate the capital expenditure. But the warning is clear. Get rid of them."More
Story image
IT leaders prioritising automation, Zero Trust and API-based security investments
"The study shows that a cocktail of multiplying threats, the proliferation of hybrid and cloud architectures, blended with a pandemic-fuelled explosion in distributed and remote work has created a perfect storm for network security teams."More
Story image
2020 sees a global shift in financial malware threats
The financial threat landscape experienced a game-changing pandemic year, according to a new report from Kaspersky.More
Story image
Infrastructure-as-code, and how it can secure the cloud
Bridgecrew recognised IaC early on as one of the best ways for modern teams to delegate security ownership to individual contributors while distributing it across existing frameworks within CI/CD pipelines. This attribute meant that IaC was invaluable in securing cloud-native environments.More