Show menu
Register Contact

Warning You Are Healthy From Devices Like Alexa Or Google Home

Dec 19, 2019

What is Alexa and Google home that can be tapped?

With looks like ordinary bluetool speakers, but really the features of these two devices are technology companies such as virtual assistants where you can give voice commands. This device acts as a control center of the smart home, smart devices, look up everything.
  • Alexa: is a virtual assistant developed by Amazon, originally used to connect devices like Amazon Echo. The company later upgraded it to become an intelligent assistant that can interact with voice, select songs, make to-do lists, set alarms, read books, as well as provide weather information. etc.
Alexa devices are likely to be eavesdropped by hackers.
  • Google Home: was developed by Google to meet the smart home of the Android operating system. Google Home is a popular device in modern home automation for a price that is also uncomfortable for many. In addition, Google Home in addition to the ability to communicate as well as the control center of the smart home, it is also focused on sound systems by Google.
What are the risks of the SRL research?

The SRL report shows that sensitive data such as account information and online payment information linked in accounts connected to the virtual assistant system will be easily stolen by hackers, through various ways. following formula:
  1. They will create a normal application that is reviewed by Amazon and Google.
  2. Then, change the application with malicious code when the application was initially approved. Then set the welcome message to appear as an error (for example, this software is not currently available in your country) and add a pause button (actually, when you click on it, you are officially infected with the code. poison).
  3. Or fake an application by placing additional reminders in that application (for example, you have an important update, please say your password to start updating). At that time, you will accidentally reveal important confidential information.
  4. After obtaining the information they need, the software installed on the machine will automatically be sent to the Hacker server.
With a few simple steps that you can't see because you're busy giving voice commands, it is easier for hackers to get your account login information and make it easier to exploit those. important friend or partner.

How do hackers eavesdrop on?

To make it clearer that the method of eavesdropping, the SRL researchers used a technique similar to the way hackers were using. In this case, cybersecurity experts have used devices like Alexa and Google Home to model and make sure they will meet the needs of the orderer.

In Alexa, the code is "Skill" and the Google Home is "Action". We then use phrases such as "Stop" and other statements that disclose personal information such as "Email", "Password", "Address" and so on. After that, we continued with commands like "Stop" followed by "Goodbye" so that the device could turn itself off but not. With malicious devices they will continue to open and listen to all the personal information of the host and then send to our pre-arranged server. This is particularly serious at Google Home because it doesn't even need activation and can be tapped whenever we want.

After sending the reports of SRL to Google and Amazon, both companies simultaneously updated the patch version, in the immediate future, they will remove the function of the supreme command "Skill" and "Home" on the two devices. above since our research.
0
0
Relate articles
Media Player Classic Home Cinema(MPC-HC) is a free audio and video player for Windows. The new Media Player Classic Home Cinema has Anti tearing option, Subtitle synchronisation, Support Vista 64bits
Artificial Intelligence (Articial Intelligence - AI) is replacing people who perform dangerous manual jobs or work in environments that are harmful to health. Machine Learning (ML) is allowing the
As you know, the latest version of Windows is now 10. Launched 4 years ago on July 29, 2015. After the failure of Windows 8 and 8.1, Windows users around the world now is losing faith in the next
That's the inspiration for creating a plug n 'play hub (connected and played), a wireless router that helps create a separate and selective internet for your children.
Therefore, setting up and installing the Wifi Router so that the best performance in the family is what everyone wants.
On January 8, the world's largest Consumer Electronics Show (CES) 2019 officially opened in Las Vegas, USA.
The sixth sense tells you that someone is using your wifi. But you don't know how to find it. Although day by day, your internet is slowing down and your internet is constantly increasing. Don't
We live in the age of modern technology, every day we wake up 90% of the first thing to do is turn on the phone ... at least you check the time on the phone and even before going to bed you have to
You realize you are sloppy in security. Start practicing routine. The following five habits will help you protect your data at home, the office and even the cafes you visit.
Comments
Add a comment
Add your comment:
Your name:
Your E-Mail:
Enter the two words shown in the image: *