1 min read

Smart Teddy Bear Weaponized by 11-Year Old Prodigy

Liviu ARSENE

May 19, 2017

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Smart Teddy Bear Weaponized by 11-Year Old Prodigy

An 11-year old prodigy using a Raspberry Pi and a laptop stunned the audience at the Netherlands cyber safety conference in Hague by remotely hacking audience members’ Bluetooth devices, downloading phone numbers, and using them to remotely dial into a smart teddy bear.

With a smart device communicating via Bluetooth or Wi-Fi, young researcher Reuben Paul demonstrated how easily someone can hack and remotely control them with basic programing skills. Emphasizing that any such devices can be weaponized against their owners, the sixth-grader pointed out that, although his smart teddy bear may look harmless, the toy could be programmed to say “meet me at this location and I will pick you up.”

“From airplanes to automobiles, from smart phones to smart homes, anything or any toy can be part of the” Internet of Things (IOT),” said Reuben. “From terminators to teddy bears, anything or any toy can be weaponized.”

As IoT devices become ubiquitous, Paul believes they can be used to spy on people and kids, steal personal and private information, or track victims by enabling their GPS systems.

Paul’s father, Mano Paul, said this is not the first time Reuben hacked a smart toy; he started with a toy car before moving to more complicated things. Mano said it all started with him explain to Reuben how a smart phone game works. After that, Reuben figured out by himself that Angry Birds was using the same kind of algorithm.

“He has always surprised us. Every moment when we teach him something he’s usually the one who ends up teaching us,” said Mano. “It means that my kids are playing with timebombs, that over time somebody who is bad or malicious can exploit.”

Reuben’s ambitious plans involve harnessing his skills for good, but only after attending CalTech or MIT to beef up his cyber security skills. His current focus is to spread the message that collaboration between law enforcement, IoT vendors, and security researchers is vital for having secure smart devices.

tags


Author



Right now

Top posts

What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read
Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

June 22, 2022

1 min read
Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

May 24, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

How to keep your Android device immune to malicious vaccine themed apps How to keep your Android device immune to malicious vaccine themed apps
Cristina POPOV

April 22, 2021

2 min read
Facebook Takes Down Two Hacking Groups Operating out of Palestine Facebook Takes Down Two Hacking Groups Operating out of Palestine
Silviu STAHIE

April 22, 2021

2 min read
Ransomware attack causes supermarket cheese shortage in the Netherlands Ransomware attack causes supermarket cheese shortage in the Netherlands
Graham CLULEY

April 13, 2021

2 min read