Hello Barbie Is Prone To 'Poodle Bugs'
American multinational toy company Mattel partnered with ToyTalk to create Barbie dolls that are connected to the Internet. However, the doll suffers insecurities as researchers found out that the doll was prone to a bug known as Poodle.
Hello Barbie, the iconic doll that can connect to the Internet designed by Mattel, has been found out to have insecurities by computer security researchers. The doll's accompanying app for iOS and Android has been found out to have several flaws that might allow hackers to eavesdrop on communications between the doll and the cloud servers where it is connected.
Hello Barbie uses wireless fidelity to transmit audio from children talking to the dolls to the servers, which process the communication and responses in return. It acts like a child's digital assistant, like Cortana from Microsoft or Siri from Apple.
OpenDNS Research Director Andrew Hay along with Bluebox Security researchers discovered that the doll uses a digital ID system that hackers can abuse. Potentially, the flaw may permit them to spy on communications between the server and the doll. Also, the vulnerability affects the Hello Barbie app for Android and iOS. In addition to the flaw, researchers discovered that smartphones with the Hello Barbie app will automatically connect to Wi-Fi networks with "Barbie" names attached to them.
Padding Oracle On Downgraded Legacy Encryption, also known as the Poodle bug, is a middleman exploit that destroys encryptions. This is the main reason that researchers from Google raised the alarm more than a year ago as it failed the tech giant's clients back to SSL 3.0.
Mattel partnered with ToyTalk in designing the Hello Barbie app. On the other hand, ToyTalk is a startup technology company founded in 2011 by former Pixar executives.
ToyTalk Chief Technology Officer and co-founder Martin Reddy stated that Bluebox alerted them of the problem and that they have been working on the issue. Nevertheless, he did not mention whether the issue was in the authentication credential or the digital ID, or whether the vulnerability had been fixed or an app release update would be coming soon to fix the issue.
iOS 11 Plagued with Untested Bugs and Early Adoption Pitfalls
Reports of nagging iOS 11 issues have started pouring in just a day after the software was released by Apple on supported devices.
iPhone 8 Outperforms iPhone X in Early Geekbench Tests [Photos]
Quite surprisingly, the iPhone 8 beats the iPhone X in both Single Core and Multi-Core Geekbench tests.
iOS 11 Release Time for Various Time Zones Across the Globe
Check out the complete list of time zones for iOS 11 release time across the globe.
iPhone X Demand May Outlast Supply Until Mid-2018, says KGI Securities Analyst
KGI Securities Analyst, Ming-Chi Kuo, predicts serious demand vs. supply constraints for the iPhone X until Mid-2018.
Five iPhone X Secret Features You May Not Know About
Check out the five iPhone X features that Apple has discreetly hidden from you at launch.
MORE IN ITECHPOST
How to Protect Yourself on Facebook
Facebook is an application that takes on an all-encompassing role in our social media lives. It is a space where we communicate with friends and family about our personal lives, browse through an endless stream of content, and interact with other companies and entities on groups and pages.
How Do Personal Emergency Response Systems Work?
Personal emergency response systems, known as PERS for short, are systems that help people to raise the alarm and get immediate help when a medical or personal emergency occurs. They are ideal for older people and anyone with a mobility issue or an injury or illness that can cause falls.
The 9 Most Popular (And Fun) Internet Games of 2019
Are you bored of board games? What are the most popular internet games from this year? These nine are popular for a reason. Check 'em out!