“Alexa, are you spying on me?” — aaaa…..mmmm…..hmmm…..maybe!!!
Security researchers have developed a new malicious ‘skill’ for Amazon’s popular voice assistant Alexa that can turn your Amazon Echo into a full-fledged spying device.
Amazon Echo is an always-listening voice-activated smart home speaker that allows you to get things done by using your voice, like playing music, setting alarms, and answering questions.
However, the device doesn’t remain activated all the time; instead, it sleeps until the user says, “Alexa,” and by default, it ends a session after some duration.
Source: Amazon Alexa Has Got Some Serious Skills—Spying On Users!
In a sickening concession to bad copyright law and Microsoft’s bottom line over basic technical truths and common sense, Eric Lundgren will spend 15 months in prison for selling discs that le…
Source: How Microsoft helped imprison a man for ‘counterfeiting’ software it gives away for free
New research shows how hackers can manipulate hotel room key cards to gain access to an entire building.
Source: Hackers built a ‘master key’ for millions of hotel rooms | ZDNet
I wrote a not-so-quick how-to on getting Pi-Hole & CloudFlare DNS over HTTPS working a couple of days ago. I did my installation on Ubuntu 16.04.x and it works beautifully!
Please go check it out!
Source: Using CloudFlare to encrypt your DNS traffic with HTTPS on Ubuntu 16.04.x and setup Pi-Hole to stop ads/malware.
Windows 10 security won’t protect you from tech-support scammers’ lies and trickery.
Source: Windows warning: Tech-support scammers are ramping up attacks, says Microsoft | ZDNet
Bogus ad-blocker extensions in the Chrome Web Store trick millions of people into installing them.
Source: Google cuts fake ad blockers from Chrome Store: Were you among 20 million fooled? | ZDNet
Just 15 seconds is all you need to break into a network and lay the way for an attacker — if you have a botnet.
Source: Hackers are using botnets to take the hard work out of breaking into networks | ZDNet
This simple advice will help to protect you against hackers and government surveillance.
Source: Online security 101: Tips for protecting your privacy from hackers and spies | ZDNet
Cryptojacking is proving increasingly lucrative for cyber-attackers, and we’re only at the beginning of this form of cybercrime — here’s how it has come to pose the threat it does and where it could go next.
Source: Cryptocurrency-mining malware: Why it is such a menace and where it’s going next | ZDNet