Please turn on your JavaScript for this page to function normally.
Amazon Echo

Would you trust Amazon Alexa more if given the option to adjust privacy settings?
Giving users of smart assistants the option to adjust settings for privacy or content delivery, or both, doesn’t necessarily increase their trust in the platform, …

Hackers can turn Amazon Echo into a covert listening device
New research released by MWR InfoSecurity reveals how attackers can compromise the Amazon Echo and turn it into a covert listening device, without affecting its overall …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility