|
Not only is your Google Home device listening to you, but a new report also suggests there might be a Google contractor who’s listening as well. Even if you didn’t ask your device any questions, it’s still sending what you say to the company, who allow an actual person to collect data from it. A new report from Belgian broadcaster VRT News describes the process by which Google Home recordings end up being listened to by contractors — and the scary part is that it apparently doesn’t take much, if anything, to start a recording. While the recordings are not listened to live, audio clips are sent to subcontractors. VRT, with the help of a whistleblower, was able to listen to some of these clips and subsequently heard enough to discern the addresses of several Dutch and Belgian people using Google Home — in spite of the fact some hadn’t even uttered the words “Hey Google,” which are supposed to be the device’s listening trigger. The person who leaked the recordings was working as a subcontractor to Google, transcribing the audio files for subsequent use in improving its speech recognition. They got in touch with VRT after reading about Amazon Alexa keeping recordings indefinitely. According to the whistleblower, the recordings presented to them are meant to be carefully annotated, with notes included about the speaker's presumed identity and age. From the sound of the report, these transcribers have heard just about everything. Personal information? Bedroom activities? Domestic violence? Yes, yes, and yes. While VRT only listened to recordings from Dutch and Belgian users, the platform the whistleblower showed them had recordings from all over the world – which means there are probably thousands of other contractors listening to Assistant recordings. Concerned about your privacy visit OUR FORUM. Microsoft released quality improvements to the Windows 10 version 1903 servicing stack, the component designed to allow users to receive and install Windows updates. Microsoft says that this critical servicing stack update "addresses an issue with a Secure Boot feature update that may cause BitLocker to go into recovery mode because of a race condition." All Windows 10 users are advised to first update the servicing stack to the latest version before attempting to install the latest cumulative updates. Installing the servicing stack updates (SSU) issued by Redmond ensure that users' devices can receive and install Microsoft security fixes with the help of a reliable and robust servicing stack. In addition, customers are recommended to update the servicing stack to the latest version as soon as possible to avoid potential issues which could appear during the installation process of both feature and quality updates. As explained by Microsoft in the Windows IT Pro Center, the servicing stack update also "contains the 'component-based servicing stack' (CBS), which is a key underlying component for several elements of Windows deployment, such as DISM, SFC, changing Windows features or roles, and repairing components." The servicing stack update can be installed automatically via Windows Update or with the help of standalone update packages available for download from the Microsoft Update Catalog website. Windows Server users can use the Windows Server Update Services (WSUS) to mass deploy the update to all computers on a network. Microsoft still blocks some devices with compatibility issues from receiving and installing the Windows 10 May 2019 Update, to prevent incompatible machines from installing the update. Find installation instructions and lots more posted on OUR FORUM. TV show and movie fans are being targeted by a malicious campaign that distributes a GoBot2 backdoor variant via files downloaded from several South Korean and Chinese torrent sites. The malware dubbed GoBotKR by the ESET researchers who discovered it is being disseminated as part of a campaign started back in May 2018, with hundreds of samples having already been detected on the compromised computers of users from South Korea, China, and Taiwan. GoBotKR has been developed to specifically target South Korean fans and this is shown by the South Korea-specific evasion techniques added to the original GoBot2 backdoor. The GoLang-based GoBotKR backdoor is built by customizing the GoBot2 malware publicly available since March 2017 and the features added using GoLang libraries get executed on compromised computers with the help of legitimate Windows binaries and "third-party utilities such as BitTorrent and uTorrent clients." After infecting a victim's PC, the backdoor allows its operators to add the compromised machine to "a network of bots that can then be used to perform DDoS attacks of various kinds (e.g. SYN Flood, UDP Flood, or Slowloris)." To do that it starts by gathering and exfiltrating system information (e.g., network and OS version info, CPU and GPU versions, and installed anti-malware solutions) to its command-and-control (C2) servers, making it possible for the attackers to cherry-pick which of the bots can be used in future attacks, among a huge list of other capabilities from executing commands and scripts to running proxy/HTTP servers. For more visit OUR FORUM. |
Latest Articles
|


