Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
New smartphone vulnerability found through Siri
- This topic has 0 replies, 1 voice, and was last updated 11 months, 2 weeks ago by .
-
Topic
-
In a recent case study it was found that cellphone voice assistants such as Siri and googles equivalent can be activated remotely. Normally these respond to a vocal prompt from their user, but by transmitting audio waves the research team found a way to activate them and potentially send specific commands from a distance. These waves are in a frequency thats not detectable to the common ear, so if properly developed could prove a future risk to any device with these capabilities.
You must be logged in to reply to this topic.