Posts

Showing posts from June, 2018

Vishing

Image
Hackers have used phishing to trick victims into giving out personal information for ages. The user clicks on a link believing that he is opening a particular web site but would be really interacting with another one. The intent of the fake web site is to get personal information such as user names, passwords, credit cards and other such-like valuable assets. More recently hacks are used to take over devices in order to perform crypto mining activities or to take over the victim’s computer turning it into a zombie command-and-control device. 



Google, Amazon, Microsoft, Apple, Samsung and others are all vying for a piece of the voice activation market. Rather than interact with the devices using a keyboard, mouse or finger, humans control their devices via spoken instructions. The players in this market are marketing (or working on) devices that allow people to make calls, setup calendar appointments, send messages, consume online content, open applications and web sites as well as cont…