TRENDING NEWS

POPULAR NEWS

How Do You Get Amazon To Fix A Security Breach My

What do cyber security professionals feel about bringing Internet connected appliances like refrigerators and Amazon Echos into private homes?

I have always been one of those people that believe that someday your toaster will need its own IP address and it is not unreasonable for a home owner to expect to need to own their own block of IP address space. But speaking as a security professional this should frankly scare most of us to death.Many of the latest innovations are fantastic at making our lives more easier or at least adding a WOW factor but the sad fact is that security is often an after thought or a minimum priority to the companies that make these great inventions.As a quick example, take your phone and look at the available wifi networks in your neighborhood. A walk around my block I found a numerous printers, a doorbell, a few thermostats, lots of wireless network, and even a few cars willing to talk to me. Some of them had default names and passwords.Multiply this by the number of devices in your home and think for a moment just how much fun someone could have if they were to “hack your house.” Just this morning I was playing with a wireless system to access the water main.The power of a home that can listen to every word you say and follow every command as your direct it to open windows, close and lock doors, turn on lights, order food, cooks meals, all while making sure you never miss your favorite shows. The music you are listening to follows you as you move throughout the house and your computerized personal assistant schedules appointments and keeps you on time to all the most important events in your life.Then one morning your alarm does not wake you on time. The house seems colder then usual. The lights will not turn on. The water appears to have been shut off. Your play list is playing something called Klingon Opera. Even your toaster is playing the stuff.Your late so you rush out the door and go to work. Weird thing, the house would not auto lock, you had to do it manually. By the time you return home that evening your home is OWNED. Dozens of packages of been delivered from Amazon and other services. The FOR SALE sign in the front yard is new. The water is still off. Your bank account is empty. You have purchased a new car in Texas and made a cash offer on a home in Florida. You have 9 additional credit cards you will not find out about for months and a number of other lines of new credit.Your social security number is now being used by a maid in Illinois and a Farm hand in California but don’t worry, they filed your taxes for you.

Why does Amazon's Alexa continue to have such serious security issues as they relate to personal privacy?

Alexa has really only had two privacy issues that I'm aware of. I don't think either one is particularly serious.In one, the device was incorrectly picking up the wake word “Alexa” and then acting on the conversation that followed. If the conversation happened to include a word like “message”, it would sometimes try to send an audio message to whatever contact it thought it heard. In practice this wound up sending random recordings to random people. The fix was basically just to turn down the recognition rate on the wake word.This sort of thing is basically inevitable. Once Alexa thinks you're talking to it, it's going to interpret everything you say as a command, and weird things are going to happen. The only real way to prevent it is to not have a voice messaging feature. Perhaps they shouldn't, but that feature seems pretty useful to me. And I always assumed that having one of these devices in the home meant a small possibility of something mildly embarrassing happening.The second incident is one that happens all the time: a customer support rep fat-fingered something and attached one customer's records to another customer's email reply. When humans are involved, mistakes like this happen. Usually the company apologizes to both parties, provides some freebies, everyone leaves happy and the world keeps turning. Sometimes the person calls the press, as happened here.This second problem did occur in a really bad place to have a problem. Amazon was remiss in not putting in more controls to prevent it. The process of transferring a person's recordings to them should be automatically executed through their account, not mediated by a support rep. However, I think many companies struggle with eliminating this sort of opportunity for error in support processes, and as far as we know it only happened once. So I can't fault Amazon too much.

How do I open an Amazon box without anyone knowing?

How does one open an Amazon package without damaging it? I would like to see into some packages the family has gotten (my dad thinks mom is cheating) Is there a solid way to open a smaller box and reseal it inconspicuously? Picture of box included. Thanks for the help!

I ripped off the paper of my Amazon gift card and the code got ripped too, is there a way to fix this?

The best way to add this gift card would be to contact customer service of Amazon.If it is partially ripped then they will add it to your account on the contact itself however if it is completely ripped you’ll need to send the image of the gift card. For this they will ask you to wait for 24 hours and will get back to you via email.In some cases they may ask for the receipt of this purchase or they’ll ask you to contact the store if they are unable to add.Hope you find this helpful.

In what situations does Amazon Web Services dramatically reduce startup costs?

I think the best thing about AWS and its pricing is that you can setup your system with several servers and know it works. Then you can put all of your services back on a single machine until the load gets to the point of needing many. I have done things on AWS, and with my own half rack in a datacenter. If I were to do a new project I'd get it running on EC2 and only port to my own servers when the cost becomes an issue. And it will, unless you architect everything to be held in memory, in which case cost doesn't matter to you. The real question is: At what point is it in my interest to be in a datacenter? And I mean "in" as in you are there yourself personally. They don't have windows, the sound is numbing, the air is cold, and time seems to move at a different pace. Personally, I try to avoid it.

Kindle Fire virus? Please help!?

I get 3 suggestions:

1. Go to settings on the browser of your Kindle Fire, see if there's anything about the website and remove it. Clear any browser cache or history as well.

2. Reboot your Kindle device, see if the problem goes off

3. Get some anti virus on the Kindle, and do a scan to clean out any possible malware:

http://budurl.com/KindleAntiVirus

Hope these help.

Were Delloitte, SEC, and Equifax negligent in failing to report data breaches months after they occurred?

Possibly even CRIMINALLY Negligent.The cover-ups negate their stated values and allowed executives and others toProfitPlan retirementsTransfer/obfuscate blameThese corporations have shamefully disgraced themselves and have made ambivalent and measured responses to make themselves look more responsible.Equifax blames hack on state actors, but breach followed spat with security contractor - BoingBoingEquifax investigating stock sales made by executives during data breach - WGNTVDeloitte Gets Hacked: What We Know So Far - FortuneHackers tapped personal information in SEC breach - Financial TimesChicago sues Equifax over data breach: 'A financial fraud was committed here' - Chicago TribuneEquifax interim CEO apologizes for bad customer service after data breach - LA TimesProsecutors Open Criminal Investigation Into Equifax Breach - NY TimesEquifax Stock Sales Are the Focus of U.S. Criminal Probe - BloombergBloomberg Businessweek September 18, 2017 The Equifax Fix: Give People More Power over Their Data - From AmazonConspiracy of Credit - From Amazon BooksGovernment is not leaving it up to businesses: Security Breach Notification Laws - National Conference of State LegislaturesDeloitte is the one to watch, especially since they have published “White Papers” like: Bridging the data gap in the insurance industry Cyber crisis management: Readiness, response, and recovery.With breaches becoming commonplace in our business and regulatory community, it is incumbent on the management of our personal information to be more vigilant, more responsive, and more careful.Disclaimer: I have been employed by Equifax in the past when the company I worked for was bought by them.

TRENDING NEWS