×
GreekEnglish

×
  • Politics
  • Diaspora
  • World
  • Lifestyle
  • Travel
  • Culture
  • Sports
  • Cooking
Wednesday
15
Apr 2026
weather symbol
Athens 14°C
  • Home
  • Politics
  • Economy
  • World
  • Diaspora
  • Lifestyle
  • Travel
  • Culture
  • Sports
  • Mediterranean Cooking
  • Weather
Contact follow Protothema:
Powered by Cloudevo
> technology

With teddy bear Bluetooth hack, 11-year-old proves IoT security is no child’s play

Experts have also pointed to the potential threat to connected medical devices!

Newsroom May 26 10:48

A talented 11-year-old boy shocked security experts when he hacked into their Bluetooth devices to control his robotic teddy bear during a cybersecurity conference at the World Forum in The Hague on May 16.

Reuben Paul, a sixth grade pupil from Austin, Texas, used this clever Bluetooth hack to show the audience how even connected toys can be weaponized. The presentation illustrated the risk associated with connected devices in modern homes and businesses.

Not Your Average Bear

Paul demonstrated his abilities by using his bear, which connected to the cloud via Wi-Fi and Bluetooth, to receive and transmit messages. He plugged a Raspberry Pi into his computer and scanned the conference hall for Bluetooth-connected devices.

According to SecurityWeek, Paul downloaded dozens of numbers, including some of the devices held by key executives at the event. He then used the programming language Python to hack into his bear through one of the numbers he collected, turn on the toy’s lights and record a message from the audience.

Paul, whose father is information technology expert Mano Paul, has already made a name for himself as a “cyber ninja,” according to Mirror Online. He has been speaking at conferences since he was 8 years old. He also helped found CyberShaolin, a nonprofit organization that aims to teach children cybersecurity skills.

The Message Behind the Teddy Bear Bluetooth Hack

Paul, who wants to study cybersecurity at either CalTech or MIT, later tweeted that, although it was fun to take part in the event, he hoped people did not miss his key message, which is to secure the Internet of Things (IoT) before it becomes the “Internet of Threats.”

Many IoT devices also have Bluetooth connectivity, and the range of connected devices — from lights to cars to toys — is growing. Both end users and IT decision-makers must be alert to the potential to use Bluetooth and other mechanisms to compromise and control these devices.

A recent study by Research and Markets suggested that worldwide spending on the IoT, which reached $16.3 billion in 2016, could hit $185.9 billion by 2023. The report likened the IoT to the Industrial Revolution and asserted that it will impact the way all businesses, governments and consumers interact with the physical world.

Initiating IoT Security Conversations

Live demonstrations at last year’s DEF CON also demonstrated the potential risk associated with connected devices, according to Tom’s Guide. For example, researchers at the event showed how 75 percent of Bluetooth smart locks can be breached.

>Related articles

Videos & photos from the historic return of the Artemis II mission from the Moon: The path opens for permanent human presence in space

“I’m amazed”: Artemis II astronauts saw meteors striking the Moon

UFO expert Nick Pope dies at 60

Experts have also pointed to the potential threat to connected medical devices. Many of these potentially lifesaving items use Bluetooth to connect to devices such as smartphones. Manufacturers and health providers must work to ensure the integrity of connected medical equipment.

Managing security in the fast-changing age of connectivity is a significant challenge. According to Gartner, security leaders should work toward a foundation model that deals with prevention, detection, response and prediction concerns. Organizations with this kind of foundation should be better prepared in the event of an attack.

Source

Ask me anything

Explore related questions

#bluetooth#cyber#IT#science#security#technology
> More technology

Follow en.protothema.gr on Google News and be the first to know all the news

See all the latest News from Greece and the World, the moment they happen, at en.protothema.gr

> Latest Stories

The US has placed a $10 million bounty on the leader of a pro-Iranian organization in Iraq, which is responsible for dozens of kidnappings of American citizens

April 14, 2026

Sky News: Starmer asks the heads of the Army, Air Force and Navy to find £3.5 billion and prepare for war

April 14, 2026

Pierrakakis: The duration and intensity of the energy crisis are critical factors for the European economy

April 14, 2026

“Something may happen in Pakistan in the next two days” – Trump leaves open the possibility of talks with Iran

April 14, 2026

20 people arrested for drugs in Eastern Macedonia and Thrace

April 14, 2026

Two Greeks arrested for raising a Greek flag with the Byzantine eagle inside Hagia Sophia, watch video

April 14, 2026

New chapter in hydrocarbon exploration: Signatures to be put tomorrow for drilling in Block 2 of the Ionian Sea

April 14, 2026

Historic decision: “De Grece” officially approved by the Council of State for Pavlos and 9 other members of the former royal family

April 14, 2026
All News

> Greece

In reverence, the emotional deposition in Jerusalem, see photos & video

The Holy Temple of the Resurrection opened after many days due to the war between Israel and Iran

April 10, 2026

In the final stretch for the accreditation of joint master’s degrees: Aiming for their launch in the coming academic year

April 10, 2026

Schedule for Epitaph Procession today (10/4)

April 10, 2026

Perfect weather for Easter excursions, according to Tsatrafyllia’s forecast

April 10, 2026

Easter in Greece: The customs that continue in Greek tradition – From Nafpaktos to Corfu

April 10, 2026
Homepage
PERSONAL DATA PROTECTION POLICY COOKIES POLICY TERM OF USE
Powered by Cloudevo
Copyright © 2026 Πρώτο Θέμα