Cloud Computing

Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet.

How to Backup Your Android Smartphone

If your phone crashes unexpectedly, or worse gets lost or stolen, then you'll not just be down the cost of a phone, but also a huge amount of data.

HTML Basics-Workspace Setup

I‘m here to show you how to create webpages and sites using HTML5 and CSS. HTML is the markup language used to format and display contents for the web and is the basis for almost all content that we surf for our computer and mobile devices today.

HTML Basics-Workspace Setup

Now before we get started the first thing I want to do is to set up our workspace. I’ll be working here on a windows but will be using very basic tools to build our sites. So, you should be able to set your system up and follow along with me, no matter what operating system you are using.

Best Gaming Laptops of 2015

PC gaming is still miles ahead of its console counterpart, both in the high-end graphics computers can push, and in the depth and variety of PC available games.

HTML Basics-HTML Tag Basics

Let’s take a look at how to make a tag inside of our webpage.

Saturday, October 17, 2015

French hackers figure out how to activate Siri without talking


These hackers aren't ventriloquists, but they might have figured out something even cooler.

Researchers at the ANSSI, a French governmental agency that conducts cyber security research, have figured out a way to remotely and silently access mobile concierge services like Siri and Google Now, reports Wired. With microphone-equipped headphones plugged into a phone, the hackers can send radio frequency signals to sound like a person activating Siri or Google Now.

There's really nothing to worry about here if you have a phone with Siri or Google Now enabled from the lock screen; the likelihood that some malicious hacker could pull of this attack without you knowing is fairly slim.

The hackers use a laptop running a software-defined radio, an amplifier and an antenna to broadcast radio wave signals that are picked up by the cord on the headphones. The phone interprets these electrical signals as someone speaking into a microphone, giving the hackers full access to Siri functions.

Using a simplified, portable setup, the hackers can transmit phone-interpretable signals at a range of six and a half feet, with a larger setup increasing range to 16 feet. The hackers claim the smaller setup can fit and function in a backpack.

As reported by Wired the hackers describe a scenario in which this was used in a congested area to trick a number of phones into calling a paid hotline. The only other scenario we can think of would be if someone working in a public area left their phone with headphones plugged in out while stepping away from their desk. The hackers could then theoretically set up their spoofing device, but it would be much easier just to grab the person's phone and start messing with it.

The other limiting factor is that many new phones only activate concierge services when the phone's owner is talking, though a long press on the headphone's remote button will also do the same. With my iPhone 6S, Siri only turns on when I say "hey, Siri," but my desk neighbor could just as easily grab my phone and press the button to start sending texts and making calls.

While this attack isn't much of a threat to iPhone or Android owners, the method in which it was carried out is fascinating. It also serves as a reminder that lock-screen active concierge isn't all that secure; whether or not they know it, smartphone users are trading some level of security for convenience.

The researchers suggest that headphone manufactures add an extra layer of shielding to their cords, but considering the huge swath of headphone makers in the industry, this seems unlikely to ever happen.

So, not ventriloquism, but definitely cooler.