العودة   منتديات عميد التعريب > >

الملاحظات

شؤون المستقبل English News شؤون تكنولوجيا المستقبل باللغة الإنجليزية World English Technology News



إضافة رد
 
أدوات الموضوع انواع عرض الموضوع

قديم 2018-09-19, 12:25 AM   رقم المشاركة :1
معلومات العضو
عميد
Security firm shows how a second-hand Amazon Echo can become a spy
إحصائية العضو





معدل تقييم المستوى: 4
fab is on a distinguished road
المنتدى : شؤون المستقبل English News
Red face Security firm shows how a second-hand Amazon Echo can become a spy


منتديات عميد التعريب - المصدر الأول لتعريب البرامج و التطبيقات للعالم العربي



When a smart speaker aggregates customer data, or a car dashboard highlights the nearest McDonalds, the marketer and the consumer assume the devices can be trusted.

But recent research by Israeli Security firm vpnMentor raises red flags about whether the Internet of Things could turn into the Internet of Spying Things.

What vulnerabilities were discovered? The company recently announced the results of work by a group of ethical hackers it employed in March and April of this year.

In one project, the group was able to connect an SD card reader to a first generation Amazon Echo and install malware that could listen in to the owners daily life*or interfere with the Echos control of other household devices like smart locks or appliances.

The use case for this Manchurian Candidate-like echo envisions that the hacked speaker was purchased as a used smart speaker on the open market.

Peter Campbell, CEO of vpnMentors PR firm, Kaizensearch, said that amazon corrected the speakers vulnerability in the second generation Echo — but there is no Amazon program to certify any used smart speaker. If some enterprising hacker is able to crack future generations of Echos and they are bought on the used device market, the same infiltration can occur.

He added that Amazon does recommend the owner of a used smart speaker update the firmware, but that assumes the owner knows what to do.

What else did they hack? In another example, the first generation of the Ring smart doorbell was also hacked by vpnMentor. But, Campbell pointed out, that brand doesnt list the product by generation, so any buyer of a used Ring doorbell is on their own.



vpnMentor was also able to remotely control the Samsung Smart Camera, which is also not listed by generation, and it was able to compromise the security for the August Smart Lock, the Kwikset Kivo Smart Lock and the TP-Link Smart Plug.

A lot of people are buying smart devices second hand, Campbell said, and failing to reset the firmware.

Why does this matter to marketers? Imagine that, as in the novel 1984, every TV was watching you as you watched it. In that environment, how much would consumers trust the advertising they see there?

Telephones have already started veering into becoming tainted devices. A phone call from an unknown party is viewed as suspicious by most people because of the large number of spam calls, and the same could happen if consumers begin to suspect that, say, their smart speakers are tracking them.

Marketers may well realize that brand safety is not just about whether the page or program where the brands ad is shown features controversial text or imagery. Safe brand neighborhoods can also include the trust afforded to a given device, so marketers would best target their messages toward the devices that maintain that trust.

الموضوع Security firm shows how a second-hand Amazon Echo can become a spy ظهر أيضا على MarTech Today.



منتديات عميد التعريب - المصدر الأول لتعريب البرامج و التطبيقات للعالم العربي


Security firm shows how a second-hand Amazon Echo can become spy amazon echo econdhand ecurity py security



fab غير متواجد حالياً   رد مع اقتباس

إضافة رد

الكلمات الدلالية (Tags)
a, amazon, become, can, echo, econdhand, ecurity, firm, how, py, second-hand, security, shows, spy

أدوات الموضوع
انواع عرض الموضوع

تعليمات المشاركة
لا تستطيع إضافة مواضيع جديدة
لا تستطيع الرد على المواضيع
لا تستطيع إرفاق ملفات
لا تستطيع تعديل مشاركاتك

BB code is متاحة
كود [IMG] متاحة
كود HTML متاحة



الساعة الآن 02:13 PM


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2019, vBulletin Solutions Inc.
Search Engine Optimisation provided by DragonByte SEO (Pro) - vBulletin Mods & Addons Copyright © 2019 DragonByte Technologies Ltd.
منتديات عميد التعريب 2010 - 2019