
Sign up to save your podcasts
Or


It was perhaps inevitable. We've had domain name phishing using look-alike domain names. Now we have voice assistant phishing using "sound-alike" trigger phrases! In a published research paper titled: Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home, a group of Chinese and US researchers describe their various methods of attacking smart assistants like Amazon Alexa and Google Home.
Hosts: Leo Laporte and Steve Gibson
Bandwidth for TWiT Bits is provided by CacheFly.
By TWiT4.7
2323 ratings
It was perhaps inevitable. We've had domain name phishing using look-alike domain names. Now we have voice assistant phishing using "sound-alike" trigger phrases! In a published research paper titled: Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home, a group of Chinese and US researchers describe their various methods of attacking smart assistants like Amazon Alexa and Google Home.
Hosts: Leo Laporte and Steve Gibson
Bandwidth for TWiT Bits is provided by CacheFly.

9 Listeners

34 Listeners

109 Listeners

6 Listeners

139 Listeners

29 Listeners

96 Listeners

35 Listeners

72 Listeners

116 Listeners

94 Listeners

24 Listeners

50 Listeners

15 Listeners

10 Listeners

9 Listeners

0 Listeners

28 Listeners

31 Listeners

0 Listeners