• About
  • Advertise
  • Contact
Sunday, October 19, 2025
No Result
View All Result
NEWSLETTER
iotillinois
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
No Result
View All Result
iotillinois
No Result
View All Result
Home Security

Smart teddy bear maker faces scrutiny over data breach response

in Security
0
SHARES
3
VIEWS
Share on FacebookShare on Twitter

Did a toymaker ignore warnings about a data breach? That’s a key question swirling around Spiral Toys, a company behind a line of smart stuffed animals that security researchers worry can be easily hacked.

On Tuesday, Spiral Toys said thebreach, which affects 800,000 user accounts, only came to its attention last week on Feb. 22.

The statement is raising eyebrows. One researcher named Victor Gevers began contacting the toymaker about the problem in late December, when he noticed that a company MongoDB database storing customer information was publicly exposed.

Gevers has evendocumentedhis efforts to contact Spiral Toys, which involved email, sending a message to its CEO over a LinkedIn invite, and working with a journalist from Vice Media to try and warn the company about the breach.

Despite those attempts, he never received a response.

The breach only managed to grab headlines on Monday when another security researcher named Troy Huntbloggedabout it.

Clashing views

The toys in question, which are sold under the CloudPets brand, can allow parents and their children to send voice messages through the stuffed animals over the internet. However, Hunt found evidence that hackers looted the exposed MongoDB database that stored the toys’ customer login information.

“Anyone with the data could crack a large number of passwords, log on to accounts and pull down the voice recordings,” he said.

Why didn’t Spiral Toys act sooner? Its CEO Mark Meyers said on Tuesday that the company has checked its email inboxes, but didn’t find any messages from security researchers warning about the breach.

However, last week a journalist from Vice Media did contact the company about the incident, Meyers said.

Nevertheless, Spiral Toys didn’t speak with the journalist. “I can tell you, I think he was going to write an article that was damning one way or another. Why would you add to that?” Meyers said in an interview Monday.

“We looked at it (the problem) and thought it was a very minimal issue,” Meyers added.

Ongoing concerns

But security researchers don’t agree. It appears that several hackers have looted the exposed database from Spiral Toys, according to Hunt. Although the passwords exposed in the breach are hashed, cracking them can be easy, because many of them were created with guessable terms such as 123456, qwerty and cloudpets, he said.

“I’m just stunned at the nonchalance and total disregard for the privacy of parents and their kids,” Hunt said of Spiral Toys’ initial response to the incident.

To deal with the breach, Meyers said on Monday it planned on forcing users to reset their passwords. But Hunt is questioning why the company didn’t act faster.

“Why did they not do this when they originally learned of the breach? Why must it take public disclosure to force this?” he asked in his email.

Gevers said in a Twitter message: “I think I have tried enough to make contact.” However, he’d still like to speak with Spiral Toys about properly informing their customers about the breach.

Legal ramifications

A company like Spiral Toys, which is based in California, is required under state law to report a data breach involving user’s personal information. But it’s not unusual for a company to need several weeks or months to thoroughly investigate a breach before reporting it, said Lothar Determann a partner at law firm Baker McKenzie, who wrote a book on California privacy law.

“Companies have a duty to investigate breaches thoroughly,” he said. In that away they can avoid false alarms that might needlessly scare consumers or end up throwing a business partner under the bus.

He declined to comment about any specific companies, but he also said that California’s data breach law is designed so that state residents can claim damages from companies that fail to comply with data breach notifications. In addition, the state’s attorney general has sued companies for failing to report data breaches without a valid reason, he said.

Whether a plaintiff will win is another matter. Proving a data breach caused actual harm can often be speculative, he said.

On Tuesday, Spiral Toys said the company would file a data breach report in California once its addressed customers’ needs. But the company added that it’s found no evidence that any voice recordings made over the toy systems were exposed.

“The CloudPet services have been running safely since March 2015 and we are taking all steps necessary to continue to run safely on our production servers,” the company claimed in a statement.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Download WordPress Themes Free
Download Premium WordPress Themes Free
Premium WordPress Themes Download
Download Premium WordPress Themes Free
download udemy paid course for free
download xiomi firmware
Download Premium WordPress Themes Free
download udemy paid course for free
Tags: Smart teddy bear maker faces scrutiny over data breach response
Next Post

A new way to prevent cyberattacks on home devices

Recommended

The 6 ways to make money in IoT

The 6 ways to make money in IoT

Cisco sets $2.3B deal for unified access, multi-factor authentication security firm Duo

Cisco sets $2.3B deal for unified access, multi-factor authentication security firm Duo

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Careers
  • Cloud Computing
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Data Center
  • Data Centers
  • Databases
  • Development
  • Enterprise
  • Hardware
  • Healthcare
  • IIoT
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Leadership
  • Manufacturing
  • Mobile
  • Networking
  • Oil & Gas
  • Open Source
  • Security
  • Smart Cities
  • Smart Homes
  • Software
  • Software Development
  • Standards
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN
  • Wearables

About Us

Advance IOT information site of Illinois USA

© 2024 iotillinois.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • IoT
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software

© 2024 iotillinois.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In