Sex toys are wide open to hackers and not enough is being done to make them secure, an MP has warned.

Vibrators are equipped with long-distance remote controls and cameras, which means they could be hacked from countries as far away as Russia and North Korea.

Security experts have shown web-connected sex toys, such as the £180 ($250) Svakom Siime Eye vibrator, can be hacked to collect intimate user data.

Chi Onwurah, the Labour MP for Newcastle Central said she wants manufacturers to be legally required to upgrade the security on every device.

Scroll down for video

Sex toys are wide open to hackers and not enough is being done to make them secure, an MP has warned. Chi Onwurah, the Labour MP for Newcastle Central (pictured) said she wanted manufacturers to be legally required to upgrade security on every device

Vibrators now often come with apps that mean users can share images on mobile devices.

'You can hack a dildo, and when you've hacked that device, it's more than violating your privacy; it's violating your security,' said Ms Onwurah, speaking to The Times.

'Electric toothbrushes, fridges, doorbells, dildos — anything with the word "smart" that communicates with the rest of the world can be hacked.'

Ms Onwurah, 52, recently bought a 'smart' toothbrush and said she spent 30 minutes checking with the company that it was secure.

She warned that soon people's homes will be flooded by devices that pose a serious security risk.

'Then we've got smart shoes, smart clothes, which means you're location may be hackable and identifiable', she addded.

'You may think that it's not very important people know where you are, but that kind of information can leave you very much open to being phished.'

Last year security experts uncovered a troubling vulnerability in a WiFi-connected sex toy that could allow hackers to live stream footage from the vibrator's point of view.

Security experts have shown web-connected sex toys, such as the $250 (£180) Svakom Siime Eye vibrator (pictured), can be hacked to collect intimate user data. The Svakom Siime Eye has a camera on the end, giving users the option to capture photos or videos

The Svakom Siime Eye is a $250 (£180) vibrator with a camera on the end, giving users the option to capture photos or videos during a session, including views from inside the body.

The weakness discovered by UK security firm Pen Test Partners means someone within WiFi range could easily guess the password to instantly access the stream – or, with a little more work, connect to it remotely and geo-locate Siime Eye users.

In a video demonstrating the Siime Eye, Svakom shows how the bizarre sex toy can 'record love through pictures and videos,' capturing a person's face, body, or even more intimate views thanks to its built-in endoscope.

Paired with the associated iPhone or Android app, users can save this footage to a device.

Last year security experts uncovered a troubling vulnerability in a WiFi-connected sex toy that could allow hackers to live stream footage from the vibrator's point of view. Researchers revealed that anyone in range can connect to the AP if they can guess the password

But, security experts have slammed the firm's decision to create a vibrator-endoscope that's also a WiFi access point, arguing that it's a 'case of another IoT device produced without much care or attention.'

In a blog post for Pen Test Partners, a researcher who goes by 'Beau du Jour' reveals that anyone in range can connect to the AP if they can guess the password – which is just '88888888' by default.

This would give that person access to the live video stream without the user's knowledge.

'When somebody is using it, someone else could be seeing the video stream,' Ken Munro, fonder of Pen Test Partners, told Motherboard.

'The fact they chose to use WiFi was utterly stupid.'

And, once connected to the WiFi, a hacker can also get into the web interface, which contains an 'admin' account with a blank password.

Security experts have slammed the firm's decision to create a vibrator-endoscope that's also a WiFi access point, arguing that it's a 'case of another IoT device produced without much care or attention'

'When somebody is using it, someone else could be seeing the video stream,' Ken Munro, founder of Pen Test Partners, told Motherboard . 'The fact they chose to use WiFi was utterly stupid'

This, according to the researcher, is hard-coded in the app, meaning that 'any user wanting to use the Siime Eye the official way will never change these credentials.

So, 'if you can get onto the wireless AP, you'll have instant access to everything on this web application,' the post explains.

'It allows multiple concurrent connections too, without any fuss at all.'

According to the researchers, they first warned Svakom of the vulnerability back in December and followed up in January after they did not receive a response.

And they reached out a third time in February to follow up again, and to inform the company of further code injection issues.