new category
- Animal food can
- Others
- Snow globe
- Animal
- Souvenirs
- Statues
- Animals
- Christmas
- Other animals
- Nativity
- Dogs
- Nana
- Sister
- Baby
- Teacher
- Mom
- Family
- Dream,Inspire,etc
- Celebration
- Ornaments
- Santa
- Ceramic jar
- ceramic plant
- Ceramic figurine
- Wholesale Product
- Fox
- Frog
- Turkey
- Ceramic succulent plant
- Ceramic Halloween decor
- Pumpkin
- Scarecrow
- Ungrouped
- Tree
- Other decoration
- Money Bank
- Models
- Fridge magnet
- Nativity set
- suit tiles
- Graduation
- Aunt
- Dad
- owl
- Friend
- Nurse
- Ceramic candle holder
- Fairy miniture
- Gnome
- Snowman
- Christmas Tree
- Wedding
- Valentine
- Valentine&Wedding
- Shower curtain
- Ceramic Christmas decor
- Ceramic mug
- Ceramic plate
- ceramic animal
- Ghost
- Autumn&Halloween
- 2020 New Arrival
- 2021 New Arrival
- Hot sale items
- Spring
- Easter
- Angels
- Words
- Ornament
- Religious
- Daughter
- Grandma
- Hero
- Birds-Birds Accessories
- Dogs and Cats
- Cats
- Turtle
- Home decor
- Gingerbread
- Garden decoration
- Ceramic house
- ceramic flower pot
- Ceramic Products
- ceramic jewelry box/plate
- Skull Head
This 11-year-old boy turned the teddy bear into a high-tech weapon
by:Ennas
2022-01-06
On May 17, according to foreign media reports, Ruben Paul, a sixth-grade boy in Austin, Texas, USA, invaded the Bluetooth devices of experts present and manipulated a teddy bear at a cyber security conference in the Netherlands. , Showing that smart toys can also be weaponized. On the stage of the University of Nova Scotia, the 11-year-old boy, Ruben Paul, showed us this process calmly. He connected the cute teddy bear to iCloud via WiFi and Bluetooth to receive and send messages. Then, he plugged in a Raspberry Pi, a rogue device of the largest size, into his laptop, and scanned the Bluetooth devices available in the conference hall, and obtained the phone numbers of dozens of experts present. Then, using the Python computer programming language, he hacked into the teddy bear through one of the numbers, turned on a light bulb on the teddy bear, and stole a message from an expert's mobile phone. Ruben Paul said that many Internet devices have Bluetooth capabilities. I can send commands through Bluetooth docking, and then I can record audio and turn on the lights. The little boy said that in the future, the daily necessities around us, whether it is smart cars, refrigerators, lights or children's toy teddy bears, may be used to monitor us or bring us harm. He may even steal personal information, crack bank passwords, or monitor your location via GPS. This means that our personal information and even personal safety will be threatened in the future. At present, with the help of his family, Reuben Paul has established an online Shaolin non-profit organization to remind people to strengthen their awareness of online prevention. He believes that network security requires the joint efforts of manufacturers, security researchers, and the government. Keywords: smart toys, network security, teddy bear, network defense
Custom message