137th Day Of Lockdown

Maharashtra49026232728117092 Tamil Nadu2850242275754690 Andhra Pradesh2069601204641842 Karnataka164924842322998 Delhi1427231282324082 Uttar Pradesh113378668341981 West Bengal89666630601954 Bihar7179446294400 Gujarat68855517922604 Assam5549737225132 Rajasthan4941835186763 Odisha4255028698292 Haryana4005433444467 Madhya Pradesh3729827621962 Kerala3170019147103 Jammu and Kashmir2392716218449 Punjab2193014040539 Jharkhand165427503154 Chhatisgarh11408831987 Uttarakhand89015731112 Goa7947559570 Telangana751354330615 Tripura6014408437 Puducherry5123291475 Manipur3466192610 Himachal Pradesh3206200813 Nagaland26578247 Arunachal Pradesh204913263 Chandigarh137482023 Meghalaya10234236 Sikkim8544061 Mizoram5672890
Technology Other News 06 Nov 2019 Siri, Google Assista ...

Siri, Google Assistant and Amazon Echo can be hacked using lasers; Here's how

DECCAN CHRONICLE.
Published Nov 6, 2019, 12:46 pm IST
Updated Nov 6, 2019, 12:46 pm IST
These attacks called ‘Light Commands’ can be misused to unlock doors, shop on websites and start vehicles.
While clever, it isn’t easy for attackers to successfully pull off.  (Photo: 9to5Google)
 While clever, it isn’t easy for attackers to successfully pull off. (Photo: 9to5Google)

A new flaw in Amazon Echo’s working allows it to detect commands sent from lasers, catching sounds that are inaudible to the human ear. These can be misused to unlock doors, shop on websites and start vehicles.

These attacks called ‘Light Commands’ were discovered by researchers from Tokyo’s University of Electro-communications and University of Michigan. The attacks employ acoustic signals into the target microphones from as far as 110 meters and take advantage of a vulnerability of MEMS microphones to respond to light mistaking it for sound.

 

“By modulating an electrical signal in the intensity of a light beam, attackers can trick microphones into producing electrical signals as if they are receiving genuine audio,” the researchers pointed out.

Here's a video explaining how this works:

While clever, it isn’t easy for attackers to successfully pull off. The method fails when the target microphones are not in the laser’s direct line of sight, or when they are protected by locked devices, trusted voice recognition, etc.

Moreover, setting up the required equipment alone will cost a potential attacker a lot of money, with a laser pointer, laser driver, sound amplifier and a good telephoto lens required for the process.

 

Click on Deccan Chronicle Technology and Science for the latest news and reviews. Follow us on Facebook, Twitter

...




ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT