Profile cover photo
Profile photo
Misha M.-Kupriyanov
About
Posts

Post has attachment
Photo

Post has attachment

Post has attachment
Photo

Post has attachment
Photo

Post has attachment
"The Amazon Echo is vulnerable to a physical attack that allows an attacker to gain a root shell on the underlying Linux operating system and install malware without leaving physical evidence of tampering. Such malware could grant an attacker persistent remote access to the device, steal customer authentication tokens, and the ability to stream live microphone audio to remote services without altering the functionality of the device."

Post has attachment
Photo

Post has attachment
Photo

Post has attachment
Photo

Post has attachment
Photo

Post has attachment
Photo
Wait while more posts are being loaded