How to ensure that the smart home doesn’t jeopardize data privacy?

The smart home has been much hyped for what feels a very long-time, but I think it is fair to say that the smart home era is now truly upon us. This status has been almost entirely driven by the rise of the smart speaker – the first truly mass-market s… Continue reading How to ensure that the smart home doesn’t jeopardize data privacy?

Consumers fed up with passwords and KBAs, looking to voice enabled technology as the future

Pindrop released the findings of a survey that explores how 2000+ US-based consumers feel about the future of voice enabled technology and how it will impact their everyday lives. The report uncovered that consumers are so fed up with passwords and KBA… Continue reading Consumers fed up with passwords and KBAs, looking to voice enabled technology as the future

Hacking Alexa through Alexa’s Speech

An Alexa can respond to voice commands it issues. This can be exploited:

The attack works by using the device’s speaker to issue voice commands. As long as the speech contains the device wake word (usually “Alexa” or “Echo”) followed by a permissible command, the Echo will carry it out, researchers from Royal Holloway University in London and Italy’s University of Catania found. Even when devices require verbal confirmation before executing sensitive commands, it’s trivial to bypass the measure by adding the word “yes” about six seconds after issuing the command. Attackers can also exploit what the researchers call the “FVV,” or full voice vulnerability, which allows Echos to make self-issued commands without temporarily reducing the device volume…

Continue reading Hacking Alexa through Alexa’s Speech

Speechin necklace recognizes its wearer’s silently spoken words

If you were in a business meeting or a quiet library, it wouldn’t really be appropriate if you suddenly blurted out “Siri, check email.” That’s where the Speechin necklace is designed to come in, as it recognizes silent speech.Continue ReadingCategory:… Continue reading Speechin necklace recognizes its wearer’s silently spoken words

Combating deepfakes: How we can future-proof our biometric identities

How worried should we be about deepfakes? What sort of threat do they pose to digital ID verification and the biometric technology that we are becoming so reliant on, and are there ways to combat the threat? The deepfake threat Deepfakes refer to manip… Continue reading Combating deepfakes: How we can future-proof our biometric identities

Number of users of software-based facial recognition for payments to surge

The number of users of software-based facial recognition to secure payments will exceed 1.4 billion globally by 2025, from just 671 million in 2020, a Juniper Research study reveals. This rapid growth of 120% demonstrates how widespread facial recognit… Continue reading Number of users of software-based facial recognition for payments to surge