Back to home
Technology

Amazon says bug caused select Echo Show devices to use tons of data — widgets caching large images caused gigabytes of internet usage

Source

Tom's Hardware

Published

TL;DR

AI Generated

A bug in select Amazon Echo Show devices caused excessive data usage due to widgets caching large images, but Amazon has fixed the issue. Former Microsoft engineer Dave W. Plummer reported his Echo Show used over 4 GB of data in a day, sparking concerns of spying, which Amazon denied. The bug was traced to an app downloading unnecessarily large photos, impacting data usage. Smart devices like Echo Show are designed to download images for screensavers or backgrounds, but they don't require high-resolution photos. Users can ensure privacy by using the physical mute switch on these devices.

Read Full Article

Similar Articles

Microsoft pulls Windows 11 KB5079391 preview after it causes install error loop on 25H2 and 24H2

Microsoft pulls Windows 11 KB5079391 preview after it causes install error loop on 25H2 and 24H2

Microsoft has pulled the Windows 11 KB5079391 preview update due to installation errors causing an error loop on 25H2 and 24H2 PCs. The company is investigating the root cause and the update may not roll out again until the issue is resolved. Users encountering error 0x80073712 during installation are affected by missing assembly files required by the update. Microsoft aims to make Windows updates less frustrating in 2026 with improvements like a faster Start menu and File Explorer, a movable taskbar, and enhanced update controls allowing users to pause updates for longer periods.

Windows Latest
That annoying SMS phish you just got may have come from a box like this

That annoying SMS phish you just got may have come from a box like this

Scammers have been exploiting unsecured cellular routers made by China-based Milesight IoT Co., Ltd., typically used in industrial settings, to send SMS phishing messages since 2023. These rugged IoT devices connect various remote industrial devices to central hubs using cellular networks and can be controlled via text message, Python scripts, and web interfaces. Security firm Sekoia discovered over 18,000 vulnerable routers accessible on the Internet, with some having outdated firmware and known vulnerabilities, making them easy targets for abuse. The misuse of these routers highlights the importance of securing IoT devices to prevent such phishing campaigns.

Ars Technica
Notorious software bug was killing people 40 years ago — at least three people died after radiation doses that were 100x too strong from the buggy Therac-25 radiation therapy machine

Notorious software bug was killing people 40 years ago — at least three people died after radiation doses that were 100x too strong from the buggy Therac-25 radiation therapy machine

The Therac-25 radiation therapy machine, plagued by a software bug in 1985, delivered fatal radiation doses to at least three patients due to a race condition issue. The bug allowed operators to mistakenly choose the wrong treatment mode, resulting in overdoses. The machine's software-only controls lacked hardware interlocks found in earlier models, contributing to the accidents. The incidents led to calls for improved testing and documentation in medical software development, making Therac-25 a cautionary tale in computer science education.

Tom's Hardware
A wireless device exploit uncovered 11 years ago still hasn't been fixed by some manufacturers — six vendors and 24 devices found harbouring vulnerable firmware across routers, range extenders, and more

A wireless device exploit uncovered 11 years ago still hasn't been fixed by some manufacturers — six vendors and 24 devices found harbouring vulnerable firmware across routers, range extenders, and more

Despite being disclosed in 2014, the Pixie Dust exploit remains unpatched in wireless devices from six vendors, affecting 24 devices like routers and range extenders. This exploit allows attackers to obtain a router's PIN and connect to a network without the password. NetRise found that only four of the 24 vulnerable devices were patched, with fixes arriving an average of 9.6 years after the exploit was made public. The issue highlights systemic problems in firmware supply chains and the need for consistent visibility into firmware to address old vulnerabilities.

Tom's Hardware

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.