Computer Sciences

How voice assistants follow inaudible commands

An attack against speech recognition systems with manipulated audio files used to work only via a data interface. Now, all it takes is playing the secret messages via loudspeakers.

Hi Tech & Innovation

Authentication path: NEC targets acoustic characteristics of ear

Biometric authentication has frequently made the news—without even knowing any formal definition, we are used to the headlines and the stories about how fingers or eyes can be the keys to gain access to sites and doors, ...