Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
12/21/2018
11:30 AM
100%
0%

Amazon Slip-Up Shows How Much Alexa Really Knows

Amazon mistakenly sent one user's Alexa recordings to a stranger but neglected to disclose the error.

Your worst fears about home assistants came true for one Amazon customer whose Alexa recordings were accidentally sent to a complete stranger. Amazon failed to disclose the mistake, but don't worry: The recipient learned enough about the Alexa owner to reach out.

It started when a German Amazon customer requested his Amazon-owned data, which he has a right to do under the General Data Protection Regulation (GDPR). After several weeks, the company sent a downloadable 100-Mb zip file. Some of its contents reflected the customer's Amazon searches. However, hundreds were .wav files and one contained transcripts of voice commands recorded by Alexa. The person had never owned an Alexa, so he reported the issue to Amazon, which did not respond but killed the link to the data.

However, the customer had already saved the files, so he reached out to German magazine c't because he worried Amazon hadn't shared the mistake with the data's rightful owner. By listening to the files, the publication was able to learn the person's name, habits, jobs, musical taste, and more intimate details that "got our hair standing on end," the report states. First and last names helped determine his close friends; Facebook and Twitter data filled in more of the details.

C't learned enough about the victim to contact him and inform him of the mistake. Amazon did not share the error with him, he said, but the company later contacted both the victim and accidental recipient. It claims a staff member made "a one-time error," Gizmodo reports.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
1/15/2019 | 8:05:55 AM
Re: Hard versus soft copy
Agree about 90% but in the connected world it is almost impossible to keep EVERYTHING offline.  I live with a secure (I Hope) cloud backup but generally have three hard drives (right, 3) that are TURNED OFF on my main system and turned on ONLY when I scan new data to them and then hard turn off again.  I know being on for a few seconds, well, a risk but you cannot live totally 100% SAFE in this world anymore.  Let's get did of Social Security numbers being personal identifiers for a start.  But I am protected nine times over for Ransomware, I could survive that with a ghost image of primary drive and 3 drives for backup restoration.  
PaulChau
50%
50%
PaulChau,
User Rank: Apprentice
1/15/2019 | 2:49:07 AM
Hard versus soft copy
And folks, this is why there will always be people who will stick to paper and pen despite all of the technology in the world available at their fingertips. Sure it might be convenient to put all of your data into storage online, but if it's any information worth anything of value, you write it down and keep it under lock and key physically rather than on a network!
ChristopherJames
50%
50%
ChristopherJames,
User Rank: Strategist
1/4/2019 | 4:42:38 AM
Across the digital world
Isn't it frightening to know just how much personal info we are actually trading across the digital world without our knowledge? We could become ever so complacent about our digital activities that we overlook the actual security behind them. We might see them as harmless activities but in actual fact, we are actually disclosing our most intimate secrets to the whole world wide web.
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Ransomware Damage Hit $11.5B in 2019
Dark Reading Staff 2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19668
PUBLISHED: 2020-02-27
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-17963. Reason: This candidate is a reservation duplicate of CVE-2018-17963. Notes: All CVE users should reference CVE-2018-17963 instead of this candidate. All references and descriptions in this candidate have been removed to preve...
CVE-2019-12882
PUBLISHED: 2020-02-27
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2017-6363
PUBLISHED: 2020-02-27
** DISPUTED ** In the GD Graphics Library (aka LibGD) through 2.2.5, there is a heap-based buffer over-read in tiffWriter in gd_tiff.c. NOTE: the vendor says "In my opinion this issue should not have a CVE, since the GD and GD2 formats are documented to be 'obsolete, and should only be used for...
CVE-2017-6371
PUBLISHED: 2020-02-27
Synchronet BBS 3.16c for Windows allows remote attackers to cause a denial of service (service crash) via a long string in the HTTP Referer header.
CVE-2017-5861
PUBLISHED: 2020-02-27
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-1000020. Reason: This candidate is a reservation duplicate of CVE-2017-1000020. Notes: All CVE users should reference CVE-2017-1000020 instead of this candidate. All references and descriptions in this candidate have been removed to...