Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
12/21/2018
11:30 AM
100%
0%

Amazon Slip-Up Shows How Much Alexa Really Knows

Amazon mistakenly sent one user's Alexa recordings to a stranger but neglected to disclose the error.

Your worst fears about home assistants came true for one Amazon customer whose Alexa recordings were accidentally sent to a complete stranger. Amazon failed to disclose the mistake, but don't worry: The recipient learned enough about the Alexa owner to reach out.

It started when a German Amazon customer requested his Amazon-owned data, which he has a right to do under the General Data Protection Regulation (GDPR). After several weeks, the company sent a downloadable 100-Mb zip file. Some of its contents reflected the customer's Amazon searches. However, hundreds were .wav files and one contained transcripts of voice commands recorded by Alexa. The person had never owned an Alexa, so he reported the issue to Amazon, which did not respond but killed the link to the data.

However, the customer had already saved the files, so he reached out to German magazine c't because he worried Amazon hadn't shared the mistake with the data's rightful owner. By listening to the files, the publication was able to learn the person's name, habits, jobs, musical taste, and more intimate details that "got our hair standing on end," the report states. First and last names helped determine his close friends; Facebook and Twitter data filled in more of the details.

C't learned enough about the victim to contact him and inform him of the mistake. Amazon did not share the error with him, he said, but the company later contacted both the victim and accidental recipient. It claims a staff member made "a one-time error," Gizmodo reports.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
1/15/2019 | 8:05:55 AM
Re: Hard versus soft copy
Agree about 90% but in the connected world it is almost impossible to keep EVERYTHING offline.  I live with a secure (I Hope) cloud backup but generally have three hard drives (right, 3) that are TURNED OFF on my main system and turned on ONLY when I scan new data to them and then hard turn off again.  I know being on for a few seconds, well, a risk but you cannot live totally 100% SAFE in this world anymore.  Let's get did of Social Security numbers being personal identifiers for a start.  But I am protected nine times over for Ransomware, I could survive that with a ghost image of primary drive and 3 drives for backup restoration.  
PaulChau
50%
50%
PaulChau,
User Rank: Apprentice
1/15/2019 | 2:49:07 AM
Hard versus soft copy
And folks, this is why there will always be people who will stick to paper and pen despite all of the technology in the world available at their fingertips. Sure it might be convenient to put all of your data into storage online, but if it's any information worth anything of value, you write it down and keep it under lock and key physically rather than on a network!
ChristopherJames
50%
50%
ChristopherJames,
User Rank: Strategist
1/4/2019 | 4:42:38 AM
Across the digital world
Isn't it frightening to know just how much personal info we are actually trading across the digital world without our knowledge? We could become ever so complacent about our digital activities that we overlook the actual security behind them. We might see them as harmless activities but in actual fact, we are actually disclosing our most intimate secrets to the whole world wide web.
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3154
PUBLISHED: 2020-01-27
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
CVE-2019-17190
PUBLISHED: 2020-01-27
A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the...
CVE-2014-8161
PUBLISHED: 2020-01-27
PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
CVE-2014-9481
PUBLISHED: 2020-01-27
The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.
CVE-2015-0241
PUBLISHED: 2020-01-27
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric ...