The Latest in IT Security

Posts Tagged ‘voice commands’

A group of researchers from Georgetown University and UC Berkeley have demonstrated how voice commands hidden in YouTube videos can be used by malicious attackers to compromise smartphones. In order for the attack to work, the target smartphones have to have Apple Siri or Google Now – the intelligent personal assistant software that uses a […]

Read more ...

It combines that with an infrared camera and microphone that watches and listens for hand gestures and voice commands so you can control your phone without taking it out of your pocket. Navdys big sell is to let you see certain apps and notifications in a single or split view, something you might not get […]

Read more ...

Siri needs to brush up on her security. Using voice commands, its possible to bypass the lock screen of an iOS device running version 7.1.1, access that phones contacts list, and call a contact from the bypassed phone. The hacker needs physical access to the phone, which needs to be running iOS 7.1.1 and have […]

Read more ...


Categories

FRIDAY, MARCH 29, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments