• CheckPoint.com
  • Facebook
  • Google Plus
  • LinkedIn
  • E-Mail Checked Point Research
  • RSS
  • Twitter
Check Point Research
  • Publications
    • Threat Research
    • CPRadio
    • Attack Reports
  • Tools
    • SandBlast File Analysis
    • How-To Guides
    • URL Categorization
    • Instant Security Assessment
    • Live Threat Map
  • About Us
  • Contact Us
  • Subscribe
  • Are You Under Attack?
MENU

Alexa what’s going on?

November 3, 2020

Most people place their virtual assistants in their living room or bedroom. This makes it very easy to interact with cyberspace while you’re laying around, watching T.V., or doing dishes. It also means that you’re allowing a listening device into the most sensitive spaces in your home. What if somebody were able to take control of that device? To make commands on your behalf, interact with your personal data, and listen to you when you don’t realize it?

Related Articles

Helping You Immunize Your Organization Against the Cyber Pandemic: Check Point Research’s 2021 Security Report

Vulnerability in Google Play Core Library Remains Unpatched in Google Play Applications

Graphology of an Exploit – Hunting for exploits by looking for the author’s fingerprints

Keeping the gate locked on your IoT devices: Vulnerabilities found on Amazon’s Alexa

New Joker variant hits Google Play with an old trick

Would you like some RCE with your Guacamole?

“The Turkish Rat” Evolved Adwind in a Massive Ongoing Phishing Campaign

Remote Cloud Execution – Critical Vulnerabilities in Azure Cloud Infrastructure (Part I)

Canadian banks targeted in a massive phishing campaign

March 1st – Threat Intelligence Report

22nd February – Threat Intelligence Report

The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day

ApoMacroSploit : Apocalyptical FUD race

Publications
  • GLOBAL CYBER ATTACK REPORTS
  • RESEARCH PUBLICATIONS
  • IPS ADVISORIES
  • CHECK POINT BLOG
  • DEMOS
Tools
  • SANDBLAST FILE ANALYSIS
  • URL CATEGORIZATION
  • INSTANT SECURITY ASSESSMENT
  • LIVE THREAT MAP
About Us
Contact Us
Subscribe

© 1994 Check Point Software Technologies LTD. All rights reserved.
Property of CheckPoint.com | Privacy Policy

Call For Papers