Netimperative
Netimperative
  • Home
  • Ads
  • Content
  • Mobile
  • E-commerce
  • Social
  • Regulation
  • Video
  • Viral
Menu
  • Apple
  • Amazon
  • Facebook
  • Google
  • twitter
  • WhatsApp
  • YouTube

Siri ‘can be hacked by radio 16 feet away’- report

October 16, 2015

A pair of French researchers have discovered the voice command on iPhones and Android smartphones helpfully obeys the orders of any hacker who talks to them—even one who’s silently transmitting those commands via radio from as far as 16 feet away.

The researchers at ANSSI, a French government agency devoted to information security, published the findings in the Institute of Electrical and Electronics Engineers (IEEE).

“While it’s worth noting it takes a special set of circumstances to pull off the hack, the idea of someone secretly ordering your phone to open a website, eavesdropping on your conversations or sending text messages is terrifying.” ABC News reported.

The researchers used the cord of the headphones as an antenna, and tricked the phones into thinking the electric signals they were sending were actual voices. This means they could, without actually speaking, command Siri to not only make calls, but also open a browser and navigate to a specific site, or use email or Facebook.

Vincent Strubel, the director of this research group at ANSSI — a French government agency that deals with information security — says, “The sky is the limit here. Everything you can do through the voice interface you can do remotely and discreetly through electromagnetic waves.”

This hack uses a fairly simple equipment that could fit inside a backpack, though this would only give it a range of 6 ½ feet. To get the full 16 feet, the batteries needed would require a bigger space, like a car.

Gavin Reid, VP of Threat Intelligence at Lancope has the following commented on the implications for voice assitants: “Additional functionality, especially concerning user convenience, has often come at the cost of some security.”

Reid added: “In this case the hack needs proximity to work and is a proof of concept needing specialised hardware. High security government equipment and installations have often come with additional shielding specifically to limit emanations and any covert channels. This attack is less likely to be leveraged by the criminal underground especially with other methods much easier to implement”.


ABC Breaking News | Latest News Videos

Mobile, Regulation Android, email, Facebook, government, security

Archives

Tags

advertising agencies Amazon analytics Android Apple apps Australia BBC brands Brazil broadband China Christmas comScore content digital marketing ecommerce email Entertainment Europe Facebook France games Germany global Google government images infographic local marketing media Microsoft music Privacy retail Search security smartphones technology Twitter UK video YouTube

Recent Posts

  • Top six Valentine’s Day ads for 2022
  • 2021 Halloween: digital marketing campaigns we loved this year
  • Empowering employees; the critical link between EX and CX
  • Investing in in-app social features is a must in a world that is crying out to be connected
  • QR codes, Gen Z and the future of OOH

Copyright © 2025 Netimperative.

Magazine WordPress Theme by themehall.com

We use cookies to improve the website and your experience. We’ll assume you’re okay with this, but you’re welcome to opt-out
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT