As much as people enjoy their virtual assistants, sometimes they do things that are downright creepy. Such is the case for a family in Portland who discovered that Amazon Alexa recorded a conversation without permission and sent it to a random person in their contact list.
Public record documents obtained from two US states reveal that Amazon has entered the surveillance market, where it's been silently advertising its facial recognition software to law enforcement agencies.
Two of today's biggest cloud service providers are now blocking a technique called "domain fronting" that has been used by websites and applications to avoid government-based censorship, but also by malware to secretly siphon stolen data to covert servers.
Researchers at cybersecurity firm Checkmarx have found a way to turn an Amazon Echo (Alexa-powered) smart speaker into an eavesdropping device.
Roskomnadzor, Russia's telecommunications watchdog, banned today over 1.8 million IP addresses belonging to Amazon and Google's cloud infrastructure.
Amazon announced today that their Amazon Key smart lock product is now available nationwide. With this expansion, Amazon Key is being offered at significant discounts, includes five new locks from Kwikset and Yale, and now has entry and exit video clips for guests.
Security experts from MindPoint Group, an information security firm, have hijacked over 2,000 subdomains from legitimate websites while researching possible security flaws in Amazon's CloudFront CDN service.
New research published on Monday reveals that 5.8% of all Amazon S3 buckets are publicly readable, while 2% are publicly writeable —with the latter allowing anyone to add, edit, or delete data, and even hold a victim's data for ransom.
Amazon AWS S3 cloud storage servers might soon fall victims to ransom attacks, similar to how hacker groups held tens of thousands of MongoDB databases for ransom throughout 2017.
If something is too good to be true, then it probably is. Such is the case with the many scams that are advertised on the Internet such as getting free rewards by participating in surveys, unbelievable work at home offers, and what we will be discussing in this article, free Amazon gift cards.
In what appears to be a New Years glitch, Amazon has sent out a barrage of emails to AWS users that state recipient's free tier services are forecasted to breach free limits. These alerts are being sent to customers who have active services and even those who do not currently have any running services with Amazon.
US data analytics provider Alteryx has left an Amazon S3 storage bucket exposed online, leaking the sensitive details of over 123 million US households in the process.
Ten days after an Amazon S3 server exposed data from the US Army's CENTCOM and PACOM divisions, security researchers have identified another S3 server instance that leaked files from INSCOM, a joint US Army and NSA agency tasked with conducting intelligence, security, and information operations.
A month after Amazon launched Amazon Key, security experts have already identified a flaw in the device's mode of operation that could allow rogue deliverymen to re-enter customer homes without being recorded.
A security researcher revealed today he found three misconfigured Amazon S3 servers belonging to the US Department of Defense (DOD) containing 1.8 billion social media and forum posts made by users from all over the world, including many by Americans.
Over 20 million Amazon Echo and Google Home devices running on Android and Linux are vulnerable to attacks via the BlueBorne vulnerability, IoT cyber-security firm Armis announced today.
Following a long string of data leaks caused by misconfigured S3 servers, Amazon has decided to add a visible warning to the AWS backend dashboard panel that will let server admins know if one of their buckets (storage environments) is publicly accessible and exposing potentially sensitive data on the Internet.
Hackers can exploit exposed Amazon S3 buckets to carry out silent Man-in-the-Middle attacks or other hacks on a company's customers or internal staff.
During the past year, there has been a surge in data breach reporting regarding Amazon S3 servers left accessible online, and which were exposing private information from all sorts of companies and their customers.
After taking last week off, WikiLeaks came back today and released documentation on another CIA cyberweapon. Codenamed Pandemic, this is a tool that targets computers with shared folders, from where users download files via SMB.