Your browser is obsolete!

The page may not load correctly.

Unexpected guests

Незваные гости

Other issues in this category (60)
  • add to favourites
    Add to Bookmarks

Go ahead; you're on the air

Read: 937 Comments: 18 Rating: 43

A team of seven researchers from the University of California, Berkeley, and Georgetown University (Washington, DC) has clearly demonstrated,that an IOS or Android device can be compromised remotely using voice commands transmitted via YouTube.

To gain control over a device, criminals need only to lure the user into watching their video. Usually, the human ear can't pick out the hidden voice commands contained in the clip, but mobile devices can. Digital assistants Siri and Google Now use sound filtering to eliminate noises and execute the instructions given.

For example, attackers can instruct them to open a URL and download malware.

According to security experts, enabling notifications about the receipt and execution of voice commands will successfully protect a device from this threat 99.8 percent of the time.

Modern operating systems—particularly those run by handhelds—know a lot about users. They collect information about our location, actions, commands we input, our preferences, and much more.

#drweb #drweb

There’s nothing wrong with that since this information is used to offer us all sorts of services and features that may interest us. But, let's be honest: do we really use this abundance of stuff? Besides, all these services reduce battery life.

Our computers are packed with all kinds of software we never use, games we don't play, and services we absolutely don't need.

Dr.Web recommends

  • Disable the services and applications you don’t use. If you don't use Google Now, then:
    • Open Google settings #drweb.
    • Tap Search and Now → Now Cards.
    • Toggle off Show Cards.
    • Follow the instructions on the screen to complete setup.
  • If you no longer use a program, remove it. Any program can have vulnerabilities you aren’t aware of.
  • If you don’t know what a certain running process does, don't be lazy—look it up on the Internet. It is possible that this is a program you don't need.
  • And here is our standard tip: use an anti-virus. It will be of help if there are vulnerabilities you don't know about— and maybe even we at Doctor Web don’t know about. Even if you are a cautious user, an anti-virus is a must-have.

Rate this issue and receive Dr.Weblings! (1 vote = 1 Dr.Webling)

Sign in and get 10 Dr.Weblings for sharing the link to this issue via social media.


Unfortunately, due to Facebook's technical limitations, Dr.Weblings cannot be awarded. However, you can share this link with your friends for free.

Tell us what you think

Leave your comment on the day of publication and get 10 Dr.Weblings, or get 1 Dr.Webling for a comment posted any other day. Comments are published automatically and are reviewed by a moderator. Rules for leaving comments about Doctor Web news items.

To leave a comment, you need to log in under your Doctor Web site account. If you don't have an account yet, you can create one.