+8801723283638

24/7 Customer Support

+8801758300772

Unsurprisingly, hackers can take control of voice assistants

Gulf Phone Number Database Provide you worldwide country updated, clean and 100% Accurate Business & Consumer phone number or mailing database list. We have high quality active mobile number database, email address and only real people contact information. We will help to get decision makers b2b data for your SMS marketing or cold calling campaigns to business or consumer people mobile database.

The Gulf Phone Number company provided you up to date and clean b2b or b2c Telemarketing database for your company’s online marketing campaigns. We are world biggest  phone number database or fax number database or email database  provider company in the world. If you like to buy cell phone number database then you can see our all package of the cell phone numbers or mobile number database.

Unsurprisingly, hackers can take control of voice assistants

What began as an extra tool for smartphones has evolved into independent gadgets with a more advanced voice system, which has become another indispensable tool for brands, in addition to the fact that there are already several brands for home use on the Uganda Mobile Database market. What began as an extra tool for smartphones has evolved into independent gadgets with a more advanced voice system, which has become another indispensable tool for brands, in addition to the fact that there are already several brands for home use on the market. Among the various brands such as Siri, Apple, Amazon’s Alexa, Microsoft’s Cortana, and Google Assistant, they developed complex artificial intelligence systems, whose voice functions were always sold as “anti-hackable”, until Chinese researchers discovered a vulnerability in voice assistants from Apple, Google, Amazon, Microsoft, Samsung, and Huawei.

According to The Guardian, researchers from Zhejiang University designed a technique called “Dolphin Attack” , which translated various voice commands into ultrasonic frequencies, which are decipherable by the software that powers the voice assistants, that is, this process it would allow hackers to take control of gadgets with just a few words spoken at frequencies that people cannot hear. Uganda Mobile Database

Apparently, the vulnerability in the voice command software would also affect iPhones, Macbooks running Siri, as well as Galaxy models, Samsung models, and even Windows 10 computers. According to Asian researchers, they could ask a Macbook or Nexus 7 open a malicious website.

Specifically, to hack a voice assistant, the Brother Cell Phone List researchers used a Smartphone, plus a loudspeaker, as well as additional hardware to “manipulate the command of voice frequencies” so that when manipulating the voice assistants they could install malicious code, or malware on people’s gadgets. For computer analysts, the design of microphones’ voice assistants’ make it difficult to protect themselves from these types of attacks, since the components of their microphones use components that cannot be blocked by ultrasound.

Leave a comment

Your email address will not be published.