PogoWasRight.org

Menu
  • About
  • Privacy
Menu

Meet Brad, the Guy Keeping Your Vibrator Safe from Hackers

Posted on November 16, 2018 by pogowasright.org

Mark Hay reports:

Over the last few years, the world has started waking up to the disconcerting vulnerabilities of internet enabled sex toys. Information security (infosec) experts and white hat hackers have shown, often through eye-catching stunts, that thanks to apparent security oversights, it is possible for malicious actors to access data on certain toys’ users, muck with toys’ operations, and even take control of them. Back end monkeying could shut down toys until a user or manufacturer pays a ransom. Stolen data on things concerning usage time, location, device pairing, account names, emails, or IP addresses, or a user’s sexual orientation—not to mention pilfered chat logs, images, audio, or videos connected to a toy—could be used for humiliation, extortion, or even physical stalking. Hijacked devices could be used to commit long-distance assault, a type of sex crime our legal system is clearly not yet equipped to handle. And that’s just scratching the surface of mischief bad actors could get up to by hacking toys.

Read more on Vice.

Category: BreachesMisc

Post navigation

← Sheriff’s Dept.: The 1,079 Privileged Jailhouse Calls We Intercepted Was Actually 34,000 Calls
UK: ICO finds Metropolitan Police Service’s Gangs Matrix breached data protection laws →

Now more than ever

Search

Contact Me

Email: [email protected]

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

Categories

Recent Posts

  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets

RSS Recent Posts on DataBreaches.net

  • Major trial underway for data leak that left 72,000 victims in France
  • Anubis: A Closer Look at an Emerging Ransomware with Built-in Wiper
  • HealthEC Agrees to $5.48 Million Settlement to End Data Breach Lawsuit
  • US offering $10 million for info on Iranian hackers behind IOControl malware
  • Sompo Japan Insurance submits improvement plan after info leakage
©2025 PogoWasRight.org. All rights reserved.