know about the security of intelligent audio devices

Nov

26

2017

Alexa, do you hear me? All you want to know about the security of intelligent audio devices
By Candide West, Symantec’s leading e-security threat researcher

Smart audio devices, also known as home audio devices, are available in various forms and sizes, becoming more common over the years. It is the next step for voice assistance, after smartphones.

Echo is the most widely deployed device in the world, with a 73% market share in this category of devices. There are more than 20 million devices in the United States alone, and Google Home comes second, The remaining. Apple’s Home iPod is expected to be launched in December, while Microsoft’s Cortana has been integrated into a large number of audio devices produced by other companies.

But while these sound platforms make human life easier, can human privacy and security on the Internet be put at risk? The number of activities carried out by these devices means that any Internet hacker, or even a friend or mischievous neighbor can tamper with the privacy of the device owner.

Privacy

It is important to note that these recorded clips reach the final servers as soon as the voice commands are heard and they are sent over an encrypted network. This happens, of course, if the devices are working according to their intended purpose. Unfortunately, there is still some controversy about these devices. For example, the journalist who gave the Google Home mini device in advance before releasing it in general , discovered that the device is recording before hearing the word or phrase wake up .

Security settings

Anyone using your own audio device can adjust their settings for their own benefit, and the same applies to most Internet devices. Therefore, it is necessary to secure the home Wi-Fi network and all related devices. For example, malware on a laptop can infect these connected audio devices on the same network and change their settings without requiring a password. Fortunately, we have not yet seen this process in the real world.

As a precaution, you should avoid tying certain security-related tasks, such as closing doors, with these audio devices. If that happens, the day may come when your burglar enters the house to order the device: open the front door or turn off the video now, which would be a very risky situation, not only for digital insurance, but for your personal life as well. The same is true for sensitive information, and passwords or credit card data must not be stored on these devices.

So far, we have not seen any significant penetration of these smart devices by malicious software, and it is not likely to happen anytime soon, as they are not directly connected to the Internet. Most of the current breaches occur as a result of misuse of the commands adopted, not depending on the manipulation of the real code in these devices. As all command interpreting functions are performed through end-to-end servers, service providers have the ability to block any hacking attempts.

Protection

After you have set the settings for operating the voice command at home, you must set the security settings. Here are some guidelines that will help you focus on your insurance and privacy settings. Settings are set by mobile phone application or website. If you are concerned about securing your home audio devices, consider using Norton Core’s secure signal router, which helps you adjust the security settings for your home Internet and all connected devices and protect against any breaches.

Instructions for adjusting the operation

Be aware of the accounts you are connecting to your voicemail device. You may want to create a new account if you do not need to use your calendar or address book.
For Google Home, you can turn off personal results to prevent them from appearing.
Delete the recordings stored on your device from time to time, although this may affect the quality of the service, as the device learning feature may disable the way you speak.
In times when you are not using the audio device, switch it to silent mode. However, this may be inappropriate, as it will often stop working at the time it needs to be run.
Stop the purchase function if you do not need it, or specify a password for it.
Be aware of incoming emails, especially promotions related to new goods or services.
Protect the services associated with your device with a strong password or two procedures to verify user identity, if possible.
Use a WPA2 encrypted Wifi network, not an open hotspot network.
Create a guest gateway on the Wi-Fi network for host devices or unsecured devices connected to the Internet.
Whenever possible, you should take advantage of the functionality of the device to be limited to your voice style only.
Stop unused services.
Do not use your device to save sensitive information, such as passwords and credit card data.

Viewing:-97

In: A Technology & Gadgets Asked By: [19058 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »