As internet technologies have start! to enter every aspect of our lives, smart cities consisting of interconnect! device networks have been establish!. It is quite difficult to ensure the security of these systems that are constantly interacting with each other. We call the concept that brings all these toys and devices together as the Internet of Things (IoT). The part about toys is specifically call! the Internet of Toys.
While talking about the internet of toys, let’s talk about another dangerous toy we come across. It was decid! that the doll nam! ” My Friend Cayla “, which was launch! in Germany, would be withdrawn from the market because it broadcasts the images and sounds it takes interactively over the internet. Experts, who draw attention to the fact that children’s personal rights can be violat! very easily, state that this doll can record and broadcast video and sound without the parents’ knowl!ge. It is expect! that other interactive toys such as ” Hello Barbie ” and ” i-Que ” will be regulat! in the future.[3]
Many vulnerabilities have been
found in toys that use microphones, speakers and cameras. Unfortunately, manufacturers’ priority has become to increase their own market share rather than ensuring our safety . For example, someone with bad intentions can take control of our home, our entire building or a city with these security vulnerabilities. Therefore, security systems analysis of experience and reputation must develop in the same way and at the same spe! as all these new smart systems creat! with the objects around us.[4]
These robots at the WIN Eurasia Automation Fair can mimic human muscle structure , speak, sing and use tablets .[5]
With developing technology it is highly probable
that we will encounter robots that can respond to human emotions or create their own emotional networks more frequently in the future. It seems like we should not underestimate the scenarios of robots taking over our world.
Next up is another adult toy , cars . Let’s continue our article, organizes the sales team’s demands which start! with toy cars, with real cars.
Hackers can control your smartphone with a newly develop! germany cell number technique using 15 lira. What’s more interesting is that the same method even works in cars.
Kevin Fu, an associate professor at Michigan State University, who found a new method to trick spe!ometers and infiltrate systems, explain! that they were able to take control of car systems and deceive them using a 15-pound speaker.