Story image

Sex toys and cyber crims, oh my

16 Mar 2016

With practically everything connected to the internet these days, cyber criminals have access to almost anything in your home, car and office.

Last year we saw reports of Barbie dolls with Wi-Fi capability being able to be hacked, as well as medical equipment and machinery. 

And now, special toys in your bedroom are no longer immune to such invasion, according to a demonstration from software firm Trend Micro at a recent news conference.

According to Reuters, Trend Micro spokesperson Udo Schneider placed a large, neon-pink vibrator on the desk in front of him and then proceeded to bring it to life by typing out a few lines of code on his laptop.

While attendees may have giggled, the demonstration had a sobering message. 

"If I hack a vibrator it's just fun," Raimund Genes, chief technology officer at Trend Micro, explained. "But if I can get to the back-end, I can blackmail the manufacturer."

Last year, security services firm Pen Test Partners warned consumers that certain brands of bedroom products could be easily hacked, allowing cyber criminals to intercept communications and control them. Video could also be easily accessed.

'Apparently 'cyberdildonics' are set to be the next big thing in sex toys, allowing you to share 'sensations' across the internet,' Joe Bursell of Pen Test partners said at the time. “There is no shortage of products from various manufacturers, and even a social media site where you can get some random who you’ll probably never meet to ‘drive’ your sex toy for you.”
“If an attacker could intercept the devices communications they could portray their victim as a monumentally inept in the stimulation department, which would be hilarious and tragic in equal measure,” Bursell explains.

Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.