
Sign up to save your podcasts
Or


It was perhaps inevitable. We've had domain name phishing using look-alike domain names. Now we have voice assistant phishing using "sound-alike" trigger phrases! In a published research paper titled: Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home, a group of Chinese and US researchers describe their various methods of attacking smart assistants like Amazon Alexa and Google Home.
Hosts: Leo Laporte and Steve Gibson
Bandwidth for TWiT Bits is provided by CacheFly.
By TWiTIt was perhaps inevitable. We've had domain name phishing using look-alike domain names. Now we have voice assistant phishing using "sound-alike" trigger phrases! In a published research paper titled: Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home, a group of Chinese and US researchers describe their various methods of attacking smart assistants like Amazon Alexa and Google Home.
Hosts: Leo Laporte and Steve Gibson
Bandwidth for TWiT Bits is provided by CacheFly.