Computer Sciences

How voice assistants follow inaudible commands

An attack against speech recognition systems with manipulated audio files used to work only via a data interface. Now, all it takes is playing the secret messages via loudspeakers.

Security

Privacy issues and security risks in Alexa Skills

With the voice commands 'Alexa Skills,' users can load numerous extra functions onto their Amazon voice assistant. However, these Skills can often have security gaps and data protection problems, as a team of researchers ...

page 2 from 4