Alexa Hack Allows Continuous Eavesdropping

Vulnerabilities and attack vectors were only a matter of time for these types of devices.  Please read the article closely and note that only older (pre-2017) devices are vulnerable and physical access is needed.  You should be very cautious when buying a used device or a device from a 3rd party reseller.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s