<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security April 2018</title>
	<atom:link href="http://www.epanorama.net/blog/2018/04/02/cyber-security-april-2018/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2018/04/02/cyber-security-april-2018/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 05 Apr 2026 18:35:45 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/04/02/cyber-security-april-2018/comment-page-6/#comment-1590417</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 09 May 2018 07:41:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176994#comment-1590417</guid>
		<description><![CDATA[April’s Cybersecurity Recap: More AI, More IoT and a Push for More Privacy
https://securityintelligence.com/aprils-cybersecurity-recap-more-ai-more-iot-and-a-push-for-more-privacy/]]></description>
		<content:encoded><![CDATA[<p>April’s Cybersecurity Recap: More AI, More IoT and a Push for More Privacy<br />
<a href="https://securityintelligence.com/aprils-cybersecurity-recap-more-ai-more-iot-and-a-push-for-more-privacy/" rel="nofollow">https://securityintelligence.com/aprils-cybersecurity-recap-more-ai-more-iot-and-a-push-for-more-privacy/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/04/02/cyber-security-april-2018/comment-page-6/#comment-1589660</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 May 2018 08:09:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176994#comment-1589660</guid>
		<description><![CDATA[‘Forget the Facebook leak’: China is mining data directly from workers’ brains on an industrial scale
http://m.scmp.com/news/china/society/article/2143899/forget-facebook-leak-china-mining-data-directly-workers-brains

Government-backed surveillance projects are deploying brain-reading technology to detect changes in emotional states in employees on the production line, the military and at the helm of high-speed trains]]></description>
		<content:encoded><![CDATA[<p>‘Forget the Facebook leak’: China is mining data directly from workers’ brains on an industrial scale<br />
<a href="http://m.scmp.com/news/china/society/article/2143899/forget-facebook-leak-china-mining-data-directly-workers-brains" rel="nofollow">http://m.scmp.com/news/china/society/article/2143899/forget-facebook-leak-china-mining-data-directly-workers-brains</a></p>
<p>Government-backed surveillance projects are deploying brain-reading technology to detect changes in emotional states in employees on the production line, the military and at the helm of high-speed trains</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/04/02/cyber-security-april-2018/comment-page-5/#comment-1589656</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 May 2018 08:02:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176994#comment-1589656</guid>
		<description><![CDATA[The Pentagon is working on a radio wave weapon that stops a speeding car in its tracks
https://techcrunch.com/2018/04/30/pentagon-radio-frequency-vehicle-stopper/?utm_source=tcfbpage&amp;sr_share=facebook

Vehicular terrorism is on the rise, but technology under development by the U.S. Department of Defense  could save lives by disabling a weaponized car before it ever reaches its target. The Pentagon’s  Joint Non-Lethal Weapons Program (JNLWD) is working on a device called a Radio Frequency Vehicle Stopper to address the prevalence of vehicle-based attacks targeting civilians, Defense One reports.]]></description>
		<content:encoded><![CDATA[<p>The Pentagon is working on a radio wave weapon that stops a speeding car in its tracks<br />
<a href="https://techcrunch.com/2018/04/30/pentagon-radio-frequency-vehicle-stopper/?utm_source=tcfbpage&#038;sr_share=facebook" rel="nofollow">https://techcrunch.com/2018/04/30/pentagon-radio-frequency-vehicle-stopper/?utm_source=tcfbpage&#038;sr_share=facebook</a></p>
<p>Vehicular terrorism is on the rise, but technology under development by the U.S. Department of Defense  could save lives by disabling a weaponized car before it ever reaches its target. The Pentagon’s  Joint Non-Lethal Weapons Program (JNLWD) is working on a device called a Radio Frequency Vehicle Stopper to address the prevalence of vehicle-based attacks targeting civilians, Defense One reports.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/04/02/cyber-security-april-2018/comment-page-5/#comment-1589655</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 May 2018 08:01:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176994#comment-1589655</guid>
		<description><![CDATA[IRS Warned Congress of “Catastrophic System Failure” Six Months Before Tax Day Outage
https://spectrum.ieee.org/riskfactor/computing/it/irs-predicted-tax-filing-failure

On 17 April 2018, the final day for U.S. citizens to file 2017 tax returns, the U.S. Internal Revenue Service (IRS) suffered a major system failure related to the hardware supporting its 58-year old, 20-million line Cobol-based Individual Master File system (pdf) which is still being used today to process the vast majority of individual tax returns. As a result of the failure, the IRS extended by a day the filing due date.]]></description>
		<content:encoded><![CDATA[<p>IRS Warned Congress of “Catastrophic System Failure” Six Months Before Tax Day Outage<br />
<a href="https://spectrum.ieee.org/riskfactor/computing/it/irs-predicted-tax-filing-failure" rel="nofollow">https://spectrum.ieee.org/riskfactor/computing/it/irs-predicted-tax-filing-failure</a></p>
<p>On 17 April 2018, the final day for U.S. citizens to file 2017 tax returns, the U.S. Internal Revenue Service (IRS) suffered a major system failure related to the hardware supporting its 58-year old, 20-million line Cobol-based Individual Master File system (pdf) which is still being used today to process the vast majority of individual tax returns. As a result of the failure, the IRS extended by a day the filing due date.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/04/02/cyber-security-april-2018/comment-page-5/#comment-1589649</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 May 2018 06:55:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176994#comment-1589649</guid>
		<description><![CDATA[Chinese government admits collection of deleted WeChat messages
https://techcrunch.com/2018/04/30/chinese-government-admits-collection-of-deleted-wechat-messages/?utm_source=tcfbpage&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&amp;sr_share=facebook

Chinese authorities revealed over the weekend that they have the capability of retrieving deleted messages from the almost universally used WeChat  app. The admission doesn’t come as a surprise to many, but it’s rare for this type of questionable data collection tactic to be acknowledged publicly.

As noted by the South China Morning Post, an anti-corruption commission in Hefei province posted Saturday to social media that it has “retrieved a series of deleted WeChat conversations from a subject” as part of an investigation.]]></description>
		<content:encoded><![CDATA[<p>Chinese government admits collection of deleted WeChat messages<br />
<a href="https://techcrunch.com/2018/04/30/chinese-government-admits-collection-of-deleted-wechat-messages/?utm_source=tcfbpage&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&#038;sr_share=facebook" rel="nofollow">https://techcrunch.com/2018/04/30/chinese-government-admits-collection-of-deleted-wechat-messages/?utm_source=tcfbpage&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&#038;sr_share=facebook</a></p>
<p>Chinese authorities revealed over the weekend that they have the capability of retrieving deleted messages from the almost universally used WeChat  app. The admission doesn’t come as a surprise to many, but it’s rare for this type of questionable data collection tactic to be acknowledged publicly.</p>
<p>As noted by the South China Morning Post, an anti-corruption commission in Hefei province posted Saturday to social media that it has “retrieved a series of deleted WeChat conversations from a subject” as part of an investigation.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/04/02/cyber-security-april-2018/comment-page-5/#comment-1589610</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 30 Apr 2018 13:23:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176994#comment-1589610</guid>
		<description><![CDATA[France seizes France.com from man who’s had it since ‘94, so he sues
Jean-Noël Frydman: &quot;If it happened to me, it can happen to anyone.&quot;
https://arstechnica.com/tech-policy/2018/04/france-seizes-france-com-from-man-whos-had-it-since-94-so-he-sues/?comments=1

A French-born American has now sued his home country because, he claims, the Ministry of Foreign Affairs has illegally seized a domain that he’s owned since 1994: France.com.

In the mid-1990s, Jean-Noël Frydman bought France.com from Web.com and set up a website to serve as a &quot;digital kiosk&quot; for Francophiles and Francophones in the United States.

For over 20 years, Frydman built up a business (also known as France.com), often collaborating with numerous official French agencies, including the Consulate General in Los Angeles and the Ministry of Foreign Affairs.

However, sometime around 2015, that very same ministry initiated a lawsuit in France in an attempt to wrest control of the France.com domain away from Frydman. 

By September 2017, the Paris Court of Appeals ruled that France.com was violating French trademark law. Armed with this ruling, lawyers representing the French state wrote to Web.com demanding that the domain be handed over.

Finally, on March 12, 2018, Web.com abruptly transferred ownership of the domain to the French Ministry of Foreign Affairs. The company did so without any formal notification to Frydman and no compensation.

On April 19, Frydman filed a federal lawsuit in Virginia in an attempt to get his domain name back. The suit names the French Republic, Atout France (a government tourism agency), the Ministry of Foreign Affairs, the minister himself (Jean-Yves Le Drian), and VeriSign as defendants.

Web.com, the original registrar, is not a party to the lawsuit. 

The lawsuit accuses France of cybersquatting France.com and &quot;reverse domain-name hijacking,&quot; among other allegations.]]></description>
		<content:encoded><![CDATA[<p>France seizes France.com from man who’s had it since ‘94, so he sues<br />
Jean-Noël Frydman: &#8220;If it happened to me, it can happen to anyone.&#8221;<br />
<a href="https://arstechnica.com/tech-policy/2018/04/france-seizes-france-com-from-man-whos-had-it-since-94-so-he-sues/?comments=1" rel="nofollow">https://arstechnica.com/tech-policy/2018/04/france-seizes-france-com-from-man-whos-had-it-since-94-so-he-sues/?comments=1</a></p>
<p>A French-born American has now sued his home country because, he claims, the Ministry of Foreign Affairs has illegally seized a domain that he’s owned since 1994: France.com.</p>
<p>In the mid-1990s, Jean-Noël Frydman bought France.com from Web.com and set up a website to serve as a &#8220;digital kiosk&#8221; for Francophiles and Francophones in the United States.</p>
<p>For over 20 years, Frydman built up a business (also known as France.com), often collaborating with numerous official French agencies, including the Consulate General in Los Angeles and the Ministry of Foreign Affairs.</p>
<p>However, sometime around 2015, that very same ministry initiated a lawsuit in France in an attempt to wrest control of the France.com domain away from Frydman. </p>
<p>By September 2017, the Paris Court of Appeals ruled that France.com was violating French trademark law. Armed with this ruling, lawyers representing the French state wrote to Web.com demanding that the domain be handed over.</p>
<p>Finally, on March 12, 2018, Web.com abruptly transferred ownership of the domain to the French Ministry of Foreign Affairs. The company did so without any formal notification to Frydman and no compensation.</p>
<p>On April 19, Frydman filed a federal lawsuit in Virginia in an attempt to get his domain name back. The suit names the French Republic, Atout France (a government tourism agency), the Ministry of Foreign Affairs, the minister himself (Jean-Yves Le Drian), and VeriSign as defendants.</p>
<p>Web.com, the original registrar, is not a party to the lawsuit. </p>
<p>The lawsuit accuses France of cybersquatting France.com and &#8220;reverse domain-name hijacking,&#8221; among other allegations.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/04/02/cyber-security-april-2018/comment-page-5/#comment-1589596</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 30 Apr 2018 10:29:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176994#comment-1589596</guid>
		<description><![CDATA[Western Digital Cloud Storage Device Exposes Files to All LAN Users
https://www.securityweek.com/western-digital-cloud-storage-device-exposes-files-all-lan-users

The default configuration on the new Western Digital My Cloud EX2 storage device allows any users on the network to retrieve files via HTTP requests, Trustwave has discovered.

WD’s My Cloud represents a highly popular storage/backup device option, allowing users to easily backup important data (including documents, photos, and media files) and store it on removable media.

The new drive, however, exposes data to any unauthenticated local network user, because of a Universal Plug and Play (UPnP) media server that the device automatically starts when powered on.

By default, it allows any users capable of sending HTTP requests to the drive to grab any files from the device. Thus, any permissions or restrictions set by the owner or administrator are completely bypassed, Trustwave’s security researchers warn.]]></description>
		<content:encoded><![CDATA[<p>Western Digital Cloud Storage Device Exposes Files to All LAN Users<br />
<a href="https://www.securityweek.com/western-digital-cloud-storage-device-exposes-files-all-lan-users" rel="nofollow">https://www.securityweek.com/western-digital-cloud-storage-device-exposes-files-all-lan-users</a></p>
<p>The default configuration on the new Western Digital My Cloud EX2 storage device allows any users on the network to retrieve files via HTTP requests, Trustwave has discovered.</p>
<p>WD’s My Cloud represents a highly popular storage/backup device option, allowing users to easily backup important data (including documents, photos, and media files) and store it on removable media.</p>
<p>The new drive, however, exposes data to any unauthenticated local network user, because of a Universal Plug and Play (UPnP) media server that the device automatically starts when powered on.</p>
<p>By default, it allows any users capable of sending HTTP requests to the drive to grab any files from the device. Thus, any permissions or restrictions set by the owner or administrator are completely bypassed, Trustwave’s security researchers warn.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/04/02/cyber-security-april-2018/comment-page-5/#comment-1589595</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 30 Apr 2018 10:28:49 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176994#comment-1589595</guid>
		<description><![CDATA[Researchers Dissect Tool Used by Infamous Russian Hacker Group
https://www.securityweek.com/researchers-dissect-tool-used-infamous-russian-hacker-group

ESET security researchers have taken a deep dive into one of the tools heavily used by the Russian threat actor Sofacy over the past couple of years.

Dubbed Zebrocy, the tool serves as a first-stage malware in attacks and is comprised of a Delphi downloader, an AutoIt downloader and a Delphi backdoor. Used in multiple attacks, the malicious program often acts as a downloader for the actor’s main backdoor, Xagent. 

Also referred to as APT28, Fancy Bear, Pawn Storm, Sednit, and Strontium, and active since around 2007, the group is focused on cyber espionage and has hit government, military, and defense organizations worldwide.

Supposedly the actor behind attacks targeting the 2016 presidential election in the United States, Sofacy has been known to target Ukraine and NATO countries, and has recently switched focus to targets in Asia. 

Coexisting with another Sofacy first-stage tool, Seduploader, the Zebrocy malware has been used in attacks against victims in Azerbaijan, Bosnia and Herzegovina, Egypt, Georgia, Iran, Kazakhstan, Korea, Kyrgyzstan, Russia, Saudi Arabia, Serbia, Switzerland, Tajikistan, Turkey, Turkmenistan, Ukraine, Uruguay and Zimbabwe, ESET reveals.

Zebrocy is usually delivered via emails carrying malicious attachments and users are lured into opening them. These are either Microsoft Office documents that deliver the payload via VBA macros, exploits, or Dynamic Data Exchange (DDE), or archives containing executables with an icon and a document-like filename.

Sednit update: Analysis of Zebrocy
Zebrocy heavily used by the Sednit group over last two years
https://www.welivesecurity.com/2018/04/24/sednit-update-analysis-zebrocy/]]></description>
		<content:encoded><![CDATA[<p>Researchers Dissect Tool Used by Infamous Russian Hacker Group<br />
<a href="https://www.securityweek.com/researchers-dissect-tool-used-infamous-russian-hacker-group" rel="nofollow">https://www.securityweek.com/researchers-dissect-tool-used-infamous-russian-hacker-group</a></p>
<p>ESET security researchers have taken a deep dive into one of the tools heavily used by the Russian threat actor Sofacy over the past couple of years.</p>
<p>Dubbed Zebrocy, the tool serves as a first-stage malware in attacks and is comprised of a Delphi downloader, an AutoIt downloader and a Delphi backdoor. Used in multiple attacks, the malicious program often acts as a downloader for the actor’s main backdoor, Xagent. </p>
<p>Also referred to as APT28, Fancy Bear, Pawn Storm, Sednit, and Strontium, and active since around 2007, the group is focused on cyber espionage and has hit government, military, and defense organizations worldwide.</p>
<p>Supposedly the actor behind attacks targeting the 2016 presidential election in the United States, Sofacy has been known to target Ukraine and NATO countries, and has recently switched focus to targets in Asia. </p>
<p>Coexisting with another Sofacy first-stage tool, Seduploader, the Zebrocy malware has been used in attacks against victims in Azerbaijan, Bosnia and Herzegovina, Egypt, Georgia, Iran, Kazakhstan, Korea, Kyrgyzstan, Russia, Saudi Arabia, Serbia, Switzerland, Tajikistan, Turkey, Turkmenistan, Ukraine, Uruguay and Zimbabwe, ESET reveals.</p>
<p>Zebrocy is usually delivered via emails carrying malicious attachments and users are lured into opening them. These are either Microsoft Office documents that deliver the payload via VBA macros, exploits, or Dynamic Data Exchange (DDE), or archives containing executables with an icon and a document-like filename.</p>
<p>Sednit update: Analysis of Zebrocy<br />
Zebrocy heavily used by the Sednit group over last two years<br />
<a href="https://www.welivesecurity.com/2018/04/24/sednit-update-analysis-zebrocy/" rel="nofollow">https://www.welivesecurity.com/2018/04/24/sednit-update-analysis-zebrocy/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/04/02/cyber-security-april-2018/comment-page-5/#comment-1589594</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 30 Apr 2018 10:27:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176994#comment-1589594</guid>
		<description><![CDATA[Mozilla Adding New CSRF Protection to Firefox
https://www.securityweek.com/mozilla-adding-new-csrf-protection-firefox

Mozilla announced this week that the upcoming Firefox 60 will introduce support for the same-site cookie attribute in an effort to protect users against cross-site request forgery (CSRF) attacks.

CSRF attacks allow malicious actors to perform unauthorized activities on a website on behalf of authenticated users by getting them to visit a specially crafted webpage. These types of attacks leverage the fact that every request to a website includes cookies and many sites rely on these cookies for authentication purposes.

Mozilla has pointed out that the current web architecture does not allow websites to reliably determine if a request has been initiated legitimately by the user or if it comes from a third-party script.

“To compensate, the same-site cookie attribute allows a web application to advise the browser that cookies should only be sent if the request originates from the website the cookie came from,”]]></description>
		<content:encoded><![CDATA[<p>Mozilla Adding New CSRF Protection to Firefox<br />
<a href="https://www.securityweek.com/mozilla-adding-new-csrf-protection-firefox" rel="nofollow">https://www.securityweek.com/mozilla-adding-new-csrf-protection-firefox</a></p>
<p>Mozilla announced this week that the upcoming Firefox 60 will introduce support for the same-site cookie attribute in an effort to protect users against cross-site request forgery (CSRF) attacks.</p>
<p>CSRF attacks allow malicious actors to perform unauthorized activities on a website on behalf of authenticated users by getting them to visit a specially crafted webpage. These types of attacks leverage the fact that every request to a website includes cookies and many sites rely on these cookies for authentication purposes.</p>
<p>Mozilla has pointed out that the current web architecture does not allow websites to reliably determine if a request has been initiated legitimately by the user or if it comes from a third-party script.</p>
<p>“To compensate, the same-site cookie attribute allows a web application to advise the browser that cookies should only be sent if the request originates from the website the cookie came from,”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/04/02/cyber-security-april-2018/comment-page-5/#comment-1589593</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 30 Apr 2018 10:26:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176994#comment-1589593</guid>
		<description><![CDATA[Amazon Alexa Can Be Used for Snooping, Researchers Say
https://www.securityweek.com/amazon-alexa-can-be-used-snooping-researchers-say

Amazon&#039;s Alexa cloud-based virtual assistant for Amazon Echo can be abused to eavesdrop on users, Checkmarx security researchers have discovered.

Present on more than 31 million devices around the world, Alexa enables user interaction after a wake-up word (specifically, “Alexa”) activates it. Next, the Intelligent Personal Assistant (IPA) launches the requested capability or application – called skill, it either comes built-in or is installed from the Alexa Skills Store. 

Checkmarx researchers built a malicious skill application capable of recording user’s speech in the background and then exfiltrating the recording, all without alerting the user.

Because of the required wake-up word, the recording would have to be performed after the activation. However, the listening session would normally end after a response is delivered to the user, to protect privacy, yet the researchers found a way to keep the session alive and to hide that from the user. 

A shouldEndSession flag allows a session to stay alive for another cycle, after reading back the service’s text as a response. However, reading back the text would reveal to the user that the device is still listening.]]></description>
		<content:encoded><![CDATA[<p>Amazon Alexa Can Be Used for Snooping, Researchers Say<br />
<a href="https://www.securityweek.com/amazon-alexa-can-be-used-snooping-researchers-say" rel="nofollow">https://www.securityweek.com/amazon-alexa-can-be-used-snooping-researchers-say</a></p>
<p>Amazon&#8217;s Alexa cloud-based virtual assistant for Amazon Echo can be abused to eavesdrop on users, Checkmarx security researchers have discovered.</p>
<p>Present on more than 31 million devices around the world, Alexa enables user interaction after a wake-up word (specifically, “Alexa”) activates it. Next, the Intelligent Personal Assistant (IPA) launches the requested capability or application – called skill, it either comes built-in or is installed from the Alexa Skills Store. </p>
<p>Checkmarx researchers built a malicious skill application capable of recording user’s speech in the background and then exfiltrating the recording, all without alerting the user.</p>
<p>Because of the required wake-up word, the recording would have to be performed after the activation. However, the listening session would normally end after a response is delivered to the user, to protect privacy, yet the researchers found a way to keep the session alive and to hide that from the user. </p>
<p>A shouldEndSession flag allows a session to stay alive for another cycle, after reading back the service’s text as a response. However, reading back the text would reveal to the user that the device is still listening.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
