Learning with Technology
23.6K views | +0 today
Follow
Learning with Technology
Your new post is loading...
Your new post is loading...
Rescooped by NextLearning from ICT Security-Sécurité PC et Internet
Scoop.it!

New Way Found to Use Alexa, Google to 'Voice Phish' and Eavesdrop on Users | #CyberSecurity #CyberEspionage #Apps #Privacy

New Way Found to Use Alexa, Google to 'Voice Phish' and Eavesdrop on Users | #CyberSecurity #CyberEspionage #Apps #Privacy | Learning with Technology | Scoop.it

Developer interfaces used by Security Research Labs researchers to turn digital home assistants into ‘Smart Spies’.

Researchers have found new ways that bad actors can exploit Alexa and Google Home smart speakers to spy on users. This time the hack not only includes eavesdroping, but also includes voice-phishing, or using people’s voice cues to determine passwords.

The vulnerability lies in small apps created by developers for the devices to extend their capability called Skills for Alexa and second app called Actions on Google Home, according to a report by Security Research Labs (SRLabs). These apps “can be abused to listen in on users or vish (voice phish) their passwords,” researchers said.

“The privacy implications of an internet-connected microphone listening in to what you say are further reaching than previously understood,” researchers wrote in their report. “Users need to be more aware of the potential of malicious voice apps that abuse their smart speakers.”

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Privacy

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Alexa

 


Via Gust MEES
Gust MEES's curator insight, October 21, 2019 7:23 AM

Developer interfaces used by Security Research Labs researchers to turn digital home assistants into ‘Smart Spies’.

Researchers have found new ways that bad actors can exploit Alexa and Google Home smart speakers to spy on users. This time the hack not only includes eavesdroping, but also includes voice-phishing, or using people’s voice cues to determine passwords.

The vulnerability lies in small apps created by developers for the devices to extend their capability called Skills for Alexa and second app called Actions on Google Home, according to a report by Security Research Labs (SRLabs). These apps “can be abused to listen in on users or vish (voice phish) their passwords,” researchers said.

“The privacy implications of an internet-connected microphone listening in to what you say are further reaching than previously understood,” researchers wrote in their report. “Users need to be more aware of the potential of malicious voice apps that abuse their smart speakers.”

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Privacy

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Alexa

 

Rescooped by NextLearning from iGeneration - 21st Century Education (Pedagogy & Digital Innovation)
Scoop.it!

7 Ways Hackers Steal Your Identity on Social Media via Make Use Of

7 Ways Hackers Steal Your Identity on Social Media via Make Use Of | Learning with Technology | Scoop.it
Gavin Phillips

Via Tom D'Amico (@TDOttawa)
Leeroy Maruni's curator insight, June 17, 2020 6:53 AM
It is important for a user to realize and understand the user of social media.Therefore the user should know the relevance of privacy when looking into digital citizenship and try by all means to protect their information and social media accounts from hackers.
Rescooped by NextLearning from WHY IT MATTERS: Digital Transformation
Scoop.it!

You’re very easy to track down, even when your data has been anonymized - 3 records match 81% of the time, 15 records match 99.98% - get over the @Desjardins data breach, it may not be that bad aft...

You’re very easy to track down, even when your data has been anonymized - 3 records match 81% of the time, 15 records match 99.98% - get over the @Desjardins data breach, it may not be that bad aft... | Learning with Technology | Scoop.it

On average, in the US, using those three records, you could be correctly located in an “anonymized” database 81% of the time. Given 15 demographic attributes of someone living in Massachusetts, there’s a 99.98% chance you could find that person in any anonymized database.


Via Farid Mheir
Farid Mheir's curator insight, July 23, 2019 2:24 PM

WHY IT MATTERS: most of the population of Quebec is freaking out about the breach of 3M personal records recently. It is bad and should not go unnoticed but this study by MIT should put the breach in perspective: basically you cannot expect anonymity in this digital world. C'est la vie...