Security (via @NewsfusionApps cybersecurity News)
So now it seems voice command enabled devices are vulnerable to attacks via YouTube and sounds media using hidden voice commands within the audio which cannot be heard by the user.
Personal opinion ( the commands lead the device to a malicious site that downloads malware specific to the os)
I can’t think of any other way of deploying a payload via the voice command due to the limited nature of voice commands.
On an interesting note this can be used to compromise any voice enabled device within earshot of the device playing the compromised audio.
The shocking thing is that it is a means of infection that requires no network connection between target and compromised device nor hardware connection.
This tech could also be used for tracking using GPS , each infected phone acts as a beacon that could broadcast the audio which could be used to download an exploit that returns location data.
In short you could produce a smart map of smartphones that dynamically expands wherever the user goes ( in terms of surveillance the smartphones surrounding the target individual could be used to relay images video or audio recordings back to a server.