These holidays take precautions when buying smart toys

Smart toys are a new target for cybercriminals. Follow these tips to buy and configure them safely.

juguetes inteligentes

In Cybersecurity we can say that any device that can connect to the Internet is likely to be attacked. Therefore, smart toys should be treated like any connected device in terms of security settings. Both in the choosing and buying process as in its configuration once removed from the package.

With a few simple tips we will prevent our children’s data from being processed and used for advertising purposes. Or, worse still, being stolen by cyber attackers.

This is especially important when it comes to devices that store information about children. Data that can even be videos or photographs, as with some cameras and smart watches for children.

Before buying smart toys…

When we buy a toy we can recognize if it is a connected device, if it has a camera or microphone and uses the Internet, either because the toy has a WiFi connection or because it has a mobile application that connects to the Internet.

elementos de riesgo en juguetes inteligentes. OSI
Risk elements in connected toys. INCIBE

If the device has any of these characteristics we must perform a series of checks:

Check the Privacy Policy

The privacy policies of IoT (Internet of Things) devices should explain what data is collected and the purpose of collecting them. In this way, we can choose not to use the ‘smart’ features if we see that the toy aims to offer targeted advertising to the child or sell family personal data to third parties. Something that could also go against data protection laws.

Check if it requests registration on a web page or application

Some connected toys allow you to extend the playing experience by using the manufacturer’s website or an application. In this register the manufacturer may request personal data and other valuable information. It can also happen that this extension of the game is about cloud storage of the information collected (audios, photographs, videos, interaction data …).

In these cases, we must bear in mind that these services can be attacked by cybercriminals, as has happened with the smart toy company VTech, from which credentials, photographs and personal data of 5 million users were captured.

If we have to register in order to use the toy, we can take measures like these:

  • Use invented data, as far as possible
  • Do not use real photos that allow to identify your children.
  • Consider using a specific email account for this type of record and not the one you use daily.
  • Use a strong password that you have never used before and do not reuse it in other services.
  • Change the access password to the portal or application if the company ever alerts of a security breach.
  • If you need to save payment data, use a prepaid card provided by your bank.
  • If the toy uses cloud storage, check that the website has an adequate level of encryption and change the default password.

See if it has reported any security issues:

We will investigate on the Internet if the smart toy we are going to buy has suffered security breaches before and if they have been solved. This will reveal to us whether the company cares about the privacy and safety of children.

Check that it has Security Settings:

Being an electronic device, the company should offer information on security measures. So we can know if it has a default password, if it receives updates, if it has parental control or if its ‘smart’ features can be completely shut down.

Configure your connected toy safely

A smart toy is not like your child’s other knick-knacks. Before connecting and playing with the device, we must open it with the child and explain what we are going to do next: configure it safely.

This is a great way to raise awareness among young people about the importance of keeping their data safe. By setting up the toy together, he can familiarize himself with the safety of the devices.

  • Change the default credentials: this is the first security measure we must take when buying any device with a predefined password. In this way, we prevent cybercriminals from finding out easily.
  • Check the privacy settings: If the toy has a configuration screen, go to it and disable the privacy features that the device does not need for it to work. If it uses an application, deny permissions in the phone settings and go to the app’s privacy settings as well.
  • Check security settings: enable automatic security updates and other useful features to protect your family’s information.
  • Disable features: if the settings allow it and you prefer that the toy not use the microphone, the camera, the location or the Internet connection, disable them in the settings.
  • Check the data storage: if the toy stores information or a history of interactions, check them periodically and delete the stored data.
  • Turn off the toy: if the device has a total shutdown mode, use it every time the child finishes playing. This will stop the data collection.

With these tips, playing with smart devices will be a safer activity for your children. And, if you need more information about connected toys, you can consult this Guide from the National Cybersecurity Institute (INCIBE) and its Safe Internet for Kids (IS4K) initiative.

It’s not a DGT fine, it’s a hoax to steal your passwords

Cybercriminals attempt to infect computers by simulating a notification of a DGT fine. When you download it, a malware tries to steal the passwords of the victims of this phishing.

multa de la dgt

Phishing attacks are the most used by cybercriminals to steal data from users. In fact, according to the latest Email Fraud Landscape report, more than 6,400 fraudulent, fake or dangerous emails are sent every day. Many of them are phishing attacks.

LEER MÁS

Mobile malware is skyrocketing, don’t you have your phone protected yet?

Mobile malware keeps growing. In the last year, banking trojans specific to devices have shot up by 56%, according to a study by security company Kaspersky.

malware móvil

Malware is not just about computers. We’re not only talking about computer viruses, but about all kinds of malicious programs.

LEER MÁS

Protect your bank details on the Internet

In the middle of the sale season, online purchases skyrocket. However, few users take the precaution of protecting their banking data on the Internet.

datos bancarios

Online shopping is revolutionizing the way of consuming. In fact, even some clothing stores are innovating in their physical stores to adapt to this change. For example, Zara has already tested the concept of a physical store solely for online order collection in London, and has also robotized and computerized some of its stores to facilitate this task.

LEER MÁS

Scan your Samsung TV for viruses

Samsung Smart TVs have a function to search for malicious programs and the company recommends periodically activating them.

samsung smart tv

In our homes there are more and more devices connected to the Internet. At first it was computers, then mobiles, tablets, video game consoles … until, little by little, other everyday objects also began to have intelligent functions, such as televisions.

LEER MÁS

Be careful with online purchases during Black Friday and Cyber Monday

The sales fever during the so-called Black Friday and Cyber ​​Monday only increases year after year.

This American custom of launching irresistible offers on the dates following Thanksgiving Day and which serve as a starting signal for Christmas shopping has already been established around the world. All stores, department stores and online shopping portals offer important discounts that usually start even a week before Black Friday itself and end the following Monday or Cyber Monday.

Be careful with online purchases during Black Friday and Cyber Monday

Those who seek to enrich themselves through the Internet by deception and fraud know that these days online sales increase remarkably and therefore they are now increasing their efforts to develop more methods to con as many unsuspecting people as possible on the Internet.

LEER MÁS

What is the purpose of encrypting the mobile phone and how to do it?

Encrypting the content of a mobile phone is an additional security measure that we can adopt to make its content inaccessible by other people. Applications, documents, photos, etc. are illegible even if the memory is accessed by any means.

Para qué sirve cifrar el teléfono móvil y cómo hacerlo

The latest Android phones and tablets already come with this measure implemented by default. Also Apple mobile devices have been encrypting their content for some years now without the need for the user to configure it.

LEER MÁS

54% of users are unaware of the risks of the Internet of things

Smart coffee makers and lights, smart TVs, routers, video game consoles, security cameras, energy control systems, etc., are some examples that show how households are increasingly “connected” to the network and, therefore, more exposed to the possible action of cybercriminals.

El 54% de los usuarios desconoce los riesgos de la Internet de las cosas

In this context, the company S2 Grupo through our blog Hijosdigitales.eshas conducted a survey on cybersecurity in the use of the Internet of Things (IoT) in homes. One of the main conclusions is that 53.6% of users do not know what security measures to take to protect their devices connected to the network.

LEER MÁS

Group calls and video calls on WhatsApp

Since the beginning of last August, WhatsApp has been incorporating into its application a function expected by many of its users. Although it has taken them some time, it is now possible to make group calls and video calls on mobile phones through its service.

Llamadas y videollamadas grupales en Whatsapp

All users of WhatsApp, provided they have installed the latest version of the application, should be able to use this recent and interesting tool.

LEER MÁS

Are you looking for a way to spy on the Whatsapp? Don’t be fooled!

If you’ve come here because you’re looking for methods to spy on someone else’s WhatsApp conversations, you’re probably interested in reading this article in its entirety.

The Internet is full of information about how to spy other WhatsApp accounts. Pages and applications for mobile phones that promise to do so are multiplying on the Internet. All you have to do is search with terms like “spy WhatsApp” to get thousands of results with every kind of information, most of them deceptive and sometimes, even malicious.

Buscas cómo espiar el Whatsapp. Que no te engañen

LEER MÁS