top of page

Hidden voice commands in YouTube vids can hack mobile devices

Here is an intriguing attack vector to cause all of us to lose some sleep.  Ease of use and automation has its pitfalls.

1 view

Recent Posts

See All

Rethinking Software in the Organizational Hierarchy

I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and hierarchical security. The concept of least privilege and the d


bottom of page