Home / Security / Security: A browser worm turn out to be ample to hack an Amazon Echo

Security: A browser worm turn out to be ample to hack an Amazon Echo


Two security researchers had been topped the head hackers in this one year’s Pwn2Own hacking contest after atmosphere up and testing several high profile exploits, including an assault against an Amazon Echo.

Amat Cama and Richard Zhu, who manufacture up Personnel Fluoroacetate, scored $60,000 in worm bounties for their integer overflow exploit against basically the most up-to-date Amazon Echo Demonstrate 5, an Alexa-powered perfect exhibit.

The researchers found that the tool uses an older model of Chromium, Google’s birth-source browser initiatives, which had been forked a while in some unspecified time in the future of its pattern. The worm allowed them to take “fats keep a watch on” of the tool if linked to a malicious Wi-Fi hotspot, stated Brian Gorenc, director of Pattern Micro’s Zero Day Initiative, which placed on the Pwn2Own contest.

The researchers tested their exploits in a radio-frequency shielding enclosure to cease any birth air interference.

“This patch gap turn out to be a overall say in quite loads of the IoT units compromised in some unspecified time in the future of the contest,” Gorenc instructed TechCrunch.


Amat Cama (left) and Richard Zhu (appropriate), who manufacture up Personnel Fluoroacetate. (Image: ZDI)

An integer overflow worm occurs when a mathematical operation tries to slay a quantity nonetheless has no pickle for it in its memory, inflicting the quantity to over

Read More

About admin

Check Also

Security: Army examines TikTok security concerns after Schumer’s data warning

WASHINGTON/SAN FRANCISCO (Reuters) - The U.S. Army is undertaking a security assessment of China-owned social media platform TikTok after a Democratic lawmaker raised national security concerns over the app’s handling of user data, Army Secretary Ryan McCarthy said on Thursday. FILE PHOTO: A person holds a smartphone with Tik Tok logo displayed in this picture…

Leave a Reply

Your email address will not be published. Required fields are marked *