Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
12/21/2018
11:30 AM
100%
0%

Amazon Slip-Up Shows How Much Alexa Really Knows

Amazon mistakenly sent one user's Alexa recordings to a stranger but neglected to disclose the error.

Your worst fears about home assistants came true for one Amazon customer whose Alexa recordings were accidentally sent to a complete stranger. Amazon failed to disclose the mistake, but don't worry: The recipient learned enough about the Alexa owner to reach out.

It started when a German Amazon customer requested his Amazon-owned data, which he has a right to do under the General Data Protection Regulation (GDPR). After several weeks, the company sent a downloadable 100-Mb zip file. Some of its contents reflected the customer's Amazon searches. However, hundreds were .wav files and one contained transcripts of voice commands recorded by Alexa. The person had never owned an Alexa, so he reported the issue to Amazon, which did not respond but killed the link to the data.

However, the customer had already saved the files, so he reached out to German magazine c't because he worried Amazon hadn't shared the mistake with the data's rightful owner. By listening to the files, the publication was able to learn the person's name, habits, jobs, musical taste, and more intimate details that "got our hair standing on end," the report states. First and last names helped determine his close friends; Facebook and Twitter data filled in more of the details.

C't learned enough about the victim to contact him and inform him of the mistake. Amazon did not share the error with him, he said, but the company later contacted both the victim and accidental recipient. It claims a staff member made "a one-time error," Gizmodo reports.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
1/15/2019 | 8:05:55 AM
Re: Hard versus soft copy
Agree about 90% but in the connected world it is almost impossible to keep EVERYTHING offline.  I live with a secure (I Hope) cloud backup but generally have three hard drives (right, 3) that are TURNED OFF on my main system and turned on ONLY when I scan new data to them and then hard turn off again.  I know being on for a few seconds, well, a risk but you cannot live totally 100% SAFE in this world anymore.  Let's get did of Social Security numbers being personal identifiers for a start.  But I am protected nine times over for Ransomware, I could survive that with a ghost image of primary drive and 3 drives for backup restoration.  
PaulChau
50%
50%
PaulChau,
User Rank: Apprentice
1/15/2019 | 2:49:07 AM
Hard versus soft copy
And folks, this is why there will always be people who will stick to paper and pen despite all of the technology in the world available at their fingertips. Sure it might be convenient to put all of your data into storage online, but if it's any information worth anything of value, you write it down and keep it under lock and key physically rather than on a network!
ChristopherJames
50%
50%
ChristopherJames,
User Rank: Strategist
1/4/2019 | 4:42:38 AM
Across the digital world
Isn't it frightening to know just how much personal info we are actually trading across the digital world without our knowledge? We could become ever so complacent about our digital activities that we overlook the actual security behind them. We might see them as harmless activities but in actual fact, we are actually disclosing our most intimate secrets to the whole world wide web.
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
How Attackers Infiltrate the Supply Chain & What to Do About It
Shay Nahari, Head of Red-Team Services at CyberArk,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7843
PUBLISHED: 2019-07-18
Adobe Campaign Classic version 18.10.5-8984 and earlier versions have an Insufficient input validation vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
CVE-2019-7846
PUBLISHED: 2019-07-18
Adobe Campaign Classic version 18.10.5-8984 and earlier versions have an Improper error handling vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
CVE-2019-7847
PUBLISHED: 2019-07-18
Adobe Campaign Classic version 18.10.5-8984 and earlier versions have an Improper Restriction of XML External Entity Reference ('XXE') vulnerability. Successful exploitation could lead to Arbitrary read access to the file system in the context of the current user.
CVE-2019-7848
PUBLISHED: 2019-07-18
Adobe Campaign Classic version 18.10.5-8984 and earlier versions have an Inadequate access control vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
CVE-2019-7850
PUBLISHED: 2019-07-18
Adobe Campaign Classic version 18.10.5-8984 and earlier versions have a Command injection vulnerability. Successful exploitation could lead to Arbitrary Code Execution in the context of the current user.