{"id":46438,"date":"2015-12-03T13:08:48","date_gmt":"2015-12-03T21:08:48","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=46438"},"modified":"2025-08-27T02:13:33","modified_gmt":"2025-08-27T09:13:33","slug":"now-dolls-can-hacked","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/","title":{"rendered":"Now Dolls Can be Hacked Too"},"content":{"rendered":"<p><em>This blog post was written by Bruce Snell.<\/em><\/p>\n<p>Soon after posting our <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/most-hackable-holiday-gifts-2015\/\">Most Hackable Gifts<\/a> blog, NBC 5 in Chicago released an <a href=\"http:\/\/www.nbcchicago.com\/investigations\/WEB-10p-pkg-Surveillance-Toy_Leitner_Chicago-353434911.html\">investigative report<\/a> on a popular interactive doll being hacked.\u00a0 In the report, the security researcher detailed some of what he was able to get from the Barbie doll including wifi network IDs, account information and even audio recordings.\u00a0 This is all sensitive data that you would not want falling into the hands of a cybercriminal!<\/p>\n<p>Before we become too alarmed about trenchcoated villains scanning the airwaves for smartdolls to hijack, I would like to point out one particular frame from the video.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/guts.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-46439\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/guts.png\" alt=\"guts\" width=\"621\" height=\"347\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/guts.png 621w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/guts-300x168.png 300w\" sizes=\"auto, (max-width: 621px) 100vw, 621px\" \/><\/a><\/p>\n<p>What you\u2019re looking at is the doll in a disassembled state with probes and connections attached directly to the hardware.\u00a0 This means that to get into this particular doll, it has to be opened up and directly plugged into specialized tools.\u00a0 If your child has this doll at a coffee shop, it\u2019s not in danger of being remotely hacked by someone sitting nearby.<\/p>\n<h2><strong>What can we learn from this?<\/strong><\/h2>\n<p>What we have to keep in mind is that these toys require a lot of processing behind the scenes and this typically requires a connection to either a mobile device or a connection to the cloud.\u00a0 While this does allow for a greater range of interaction for children, it can also uknowingly expose their information to others.<\/p>\n<p>As a dad, of course I want my children to have fun toys with neat features.\u00a0 However, it\u2019s important that we truly understand what we are getting into when we buy a shiny new toy or gadget during the holidays.\u00a0 If you are considering a toy that has a cloud based component, you should pay close attention to what sort of data is being transmitted across the internet.<\/p>\n<p>This might mean that you actually have to read the manual instead of skipping to the section that shows you how to put the batteries in.\u00a0 A side benefit of reading the manual is that it will most likely tell you where you can change the default password!\u00a0 One of the first things you should do when you connect your new device to the internet is to make sure you have changed the default password so others can\u2019t take control of your device.\u00a0 At that point, it\u2019s up to you as a parent\/consumer\/gadgeteer to decide if the amount of information you are giving up is too much, but at least you can make that an informed decision.<\/p>\n<p>If you haven\u2019t already, please take a look at the <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/most-hackable-holiday-gifts-2015\/\">Most Hackable Gifts<\/a> post by Gary Davis, where we go into more detail around some of the issues around this season\u2019s hottest gifts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog post was written by Bruce Snell. Soon after posting our Most Hackable Gifts blog, NBC 5 in Chicago&#8230;<\/p>\n","protected":false},"author":674,"featured_media":171714,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,12],"tags":[],"coauthors":[3973],"class_list":["post-46438","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-family-safety"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Now Dolls Can be Hacked Too | McAfee Blog<\/title>\n<meta name=\"description\" content=\"This blog post was written by Bruce Snell. Soon after posting our Most Hackable Gifts blog, NBC 5 in Chicago released an investigative report on a popular\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Now Dolls Can be Hacked Too | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"This blog post was written by Bruce Snell. Soon after posting our Most Hackable Gifts blog, NBC 5 in Chicago released an investigative report on a popular\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-03T21:08:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-27T09:13:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/guts.png\" \/>\n\t<meta property=\"og:image:width\" content=\"621\" \/>\n\t<meta property=\"og:image:height\" content=\"347\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Now Dolls Can be Hacked Too\",\"datePublished\":\"2015-12-03T21:08:48+00:00\",\"dateModified\":\"2025-08-27T09:13:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/\"},\"wordCount\":462,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/1290x600.png\",\"articleSection\":[\"Internet Security\",\"Family Safety\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/\",\"name\":\"Now Dolls Can be Hacked Too | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/1290x600.png\",\"datePublished\":\"2015-12-03T21:08:48+00:00\",\"dateModified\":\"2025-08-27T09:13:33+00:00\",\"description\":\"This blog post was written by Bruce Snell. Soon after posting our Most Hackable Gifts blog, NBC 5 in Chicago released an investigative report on a popular\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/1290x600.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/1290x600.png\",\"width\":1291,\"height\":601},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Now Dolls Can be Hacked Too\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Now Dolls Can be Hacked Too | McAfee Blog","description":"This blog post was written by Bruce Snell. Soon after posting our Most Hackable Gifts blog, NBC 5 in Chicago released an investigative report on a popular","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Now Dolls Can be Hacked Too | McAfee Blog","og_description":"This blog post was written by Bruce Snell. Soon after posting our Most Hackable Gifts blog, NBC 5 in Chicago released an investigative report on a popular","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-12-03T21:08:48+00:00","article_modified_time":"2025-08-27T09:13:33+00:00","og_image":[{"width":621,"height":347,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/guts.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Now Dolls Can be Hacked Too","datePublished":"2015-12-03T21:08:48+00:00","dateModified":"2025-08-27T09:13:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/"},"wordCount":462,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/1290x600.png","articleSection":["Internet Security","Family Safety"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/","name":"Now Dolls Can be Hacked Too | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/1290x600.png","datePublished":"2015-12-03T21:08:48+00:00","dateModified":"2025-08-27T09:13:33+00:00","description":"This blog post was written by Bruce Snell. Soon after posting our Most Hackable Gifts blog, NBC 5 in Chicago released an investigative report on a popular","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/1290x600.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/1290x600.png","width":1291,"height":601},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/now-dolls-can-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Now Dolls Can be Hacked Too"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/46438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=46438"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/46438\/revisions"}],"predecessor-version":[{"id":221298,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/46438\/revisions\/221298"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/171714"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=46438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=46438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=46438"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=46438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}