Hacking Alexa through Alexa’s Speech

An Alexa can respond to voice commands it issues. This can be exploited:

The attack works by using the device’s speaker to issue voice commands. As long as the speech contains the device wake word (usually “Alexa” or “Echo”) followed by a permissible command, the Echo will carry it out, researchers from Royal Holloway University in London and Italy’s University of Catania found. Even when devices require verbal confirmation before executing sensitive commands, it’s trivial to bypass the measure by adding the word “yes” about six seconds after issuing the command. Attackers can also exploit what the researchers call the “FVV,” or full voice vulnerability, which allows Echos to make self-issued commands without temporarily reducing the device volume…

Continue reading Hacking Alexa through Alexa’s Speech

Speechin necklace recognizes its wearer’s silently spoken words

If you were in a business meeting or a quiet library, it wouldn’t really be appropriate if you suddenly blurted out “Siri, check email.” That’s where the Speechin necklace is designed to come in, as it recognizes silent speech.Continue ReadingCategory:… Continue reading Speechin necklace recognizes its wearer’s silently spoken words

Combating deepfakes: How we can future-proof our biometric identities

How worried should we be about deepfakes? What sort of threat do they pose to digital ID verification and the biometric technology that we are becoming so reliant on, and are there ways to combat the threat? The deepfake threat Deepfakes refer to manip… Continue reading Combating deepfakes: How we can future-proof our biometric identities

Number of users of software-based facial recognition for payments to surge

The number of users of software-based facial recognition to secure payments will exceed 1.4 billion globally by 2025, from just 671 million in 2020, a Juniper Research study reveals. This rapid growth of 120% demonstrates how widespread facial recognit… Continue reading Number of users of software-based facial recognition for payments to surge

New technique protects consumers from voice spoofing attacks

Researchers from CSIRO’s Data61 have developed a new technique to protect consumers from voice spoofing attacks. Fraudsters can record a person’s voice for voice assistants like Amazon Alexa or Google Assistant and replay it to impersonate that i… Continue reading New technique protects consumers from voice spoofing attacks

Marshall’s compact but powerful smart speaker makes Alexa rock

Sweden’s Zound Industries, the company that manufactures headphones and speakers under license from Marshall Amps, has announced the release of a new Bluetooth speaker called the Uxbridge Voice, which has Alexa built in and supports AirPlay 2.Continue … Continue reading Marshall’s compact but powerful smart speaker makes Alexa rock

Researchers use ultrasound waves vibrating through tables to access cellphones

Ultrasonic waves don’t make a sound, but they can still activate Siri on your cellphone and have it make calls, take images or read the contents of a text to a stranger. All without the phone owner’s knowledge. Ning Zhang, assistant profess… Continue reading Researchers use ultrasound waves vibrating through tables to access cellphones