Pages: [1]   Go Down
  Print  
Author Topic: Amazon and Google smart speakers can eavesdrop and phish owners; HomePod safe  (Read 340 times)
HCK
Global Moderator
Hero Member
*****
Posts: 79425



« on: October 25, 2019, 04:05:19 pm »

Amazon and Google smart speakers can eavesdrop and phish owners; HomePod safe

<div class="feat-image"></div>
<p>We’ve known since the <a href="https://arxiv.org/pdf/1805.01525.pdf" target="_blank" rel="noopener noreferrer">spring of last year[/url] that <a href="https://amzn.to/2N2XGGY" target="_blank" rel="noopener noreferrer">Amazon Alexa[/url] and <a href="https://store.google.com/us/magazine/compare_nest_speakers_displays?gclid=EAIaIQobChMI9ML_6KKt5QIVk0PTCh2DFAWTEAAYASABEgLagvD_BwE&amp;gclsrc=aw.ds" target="_blank" rel="noopener noreferrer">Google Home[/url] smart speakers can eavesdrop on owners, and even phish them via voice. However, new research shows that new malicious apps with these capabilities continue to be approved by both companies.</p>
<p>The two vulnerabilities, demonstrated in videos below, occur because both companies make their speakers smarter by allowing third-party developers to create apps or “skills” for them. Apple’s HomePod is safe because the company doesn’t allow this type of third-party access…</p>
<p> <a href="https://9to5mac.com/2019/10/21/smart-speakers-can-eavesdrop/#more-615980" class="more-link">more…[/url]</p>
<p>The post <a rel="nofollow" href="https://9to5mac.com/2019/10/21/smart-speakers-can-eavesdrop/">Amazon and Google smart speakers can eavesdrop and phish owners; HomePod safe[/url] appeared first on <a rel="nofollow" href="https://9to5mac.com">9to5Mac[/url].</p><div class="feedflare">
<img src="[url]http://feeds.feedburner.com/~ff/9To5Mac-MacAllDay?i=KJP-rd_mTUI:LLpUVmfneJU:D7DqB2pKExk" border="0"></img>[/url]
</div><img src="http://feeds.feedburner.com/~r/9To5Mac-MacAllDay/~4/KJP-rd_mTUI" height="1" width="1" alt=""/>

Source: Amazon and Google smart speakers can eavesdrop and phish owners; HomePod safe
Logged
Pages: [1]   Go Up
  Print  
 
Jump to: