Voice based interfaces are growing in popularity, complexity and influence. But securing these interfaces has, thus far, been an afterthought. If we are destined to interact with the smart systems around us using our voice, how exactly will we manage to authenticate to those devices? In this podcast we speak with Ben Rafferty of the firm Semafone about the challenges of securing voice-based systems. Semafone won the recent PAYMNTS.com Voice Challenge with a way to use Amazon’s Alexa voice assistant as an out of band authentication mechanism.
Tag: vulnerabilities
Kaspersky Deems Crypto-jacking the New Ransomware as Crypto-miners up Their Game
Because of its potential to earn hackers millions in a steady stream of cash, Kaspersky Labs has deemed crypto-jacking the new ransomware in a report that arrived just as researchers spotted two new types of malware targeting the growing popularity of cryptocurrencies.
Opinion: With Internet of Things, Devices become Insider Threat
Connected devices aren’t just fodder for botnets. They increasingly act as malicious “insiders” capable of spying on their surroundings and providing valuable intelligence on homes and offices, argues Yotam Gutman of the firm Securithings in this industry perspective.
Mobile, automation-industry leaders promote two new IoT security efforts
Recognizing the persistent need for security to protect connected devices, industry leaders are collaborating through two separate efforts on Internet of Things (IoT) standards and guidelines to help combat the emerging IoT threat landscape.
U.S. official: Don’t bring laptops or mobile devices to the World Cup in Russia
If you’re going to the FIFA World Cup 2018 in Russia and you’re thinking of taking your laptop or mobile device to the matches, just don’t do it, warned the top U.S. counterintelligence official.