To kick off our first edition of “A Learning Opportunity”, we’re starting with a really clever exploit discovered by Check Point Research. The researchers were able to find 3 vulnerabilities that could be exploited in concert to install or uninstall Alexa skills and access user information (including voice history). All that was required on the user’s end was clicking a malicious link.
Learning From Alexa's Multipart Exploit
Learning From Alexa's Multipart Exploit
Learning From Alexa's Multipart Exploit
To kick off our first edition of “A Learning Opportunity”, we’re starting with a really clever exploit discovered by Check Point Research. The researchers were able to find 3 vulnerabilities that could be exploited in concert to install or uninstall Alexa skills and access user information (including voice history). All that was required on the user’s end was clicking a malicious link.