SlideShare a Scribd company logo
1 of 4
Malware Could Steal Data from
iPhones Using Siri
No. 2015219071
Date /Fecha :
07/09/2015
Authors/ Autores:
EDWARD CAMILO
PEREA LOPEZ
John Alexander
Taborda Giraldo
1. IEEE: Introducción En Español
Un par de científicos de la computación con sede en
Europa han descubierto una vulnerabilidad de
seguridad en el iPhone 5, que podría ser explotada por
un software malicioso y que pone en peligro la
información personal de un usuario. Y el principal
factor que hace esto posible es Siri (Reconocimiento de
voz del sistema operativo de iPhone “iOS”), según
informan en la edición de enero de la IEEE Computer.
Boletín de Tecnología Inglés-Español de Estudiantes para Estudiantes
Universidad del Magdalena – Santa Marta - Colombia
Grupo MAGMA INGENIERÍA – Línea de Investigación en Didáctica de la Ingeniería
Rama Estudiantil IEEE Unimagdalena
Keywords / Palabras Claves:
Cientifics / Cientificos
Smartphone / Celular Inteligente
Operative System / Sistema Operativo
User / Usuario
(C1)
[W1]
(C2)
[W2]
(C3)
[W1]
(C4)
[W1]
(C5)
[W2]
(C6)
[W2]
2. IEEE: Information in English
Siri? What are you hiding?
On an iPhone, Siri digitally records
what the user is saying in the
microphone, forms it into packets,
sends the packets off to a remote
cloud server operated by Apple, and
receives a text response that’s
relayed to the user.
The original Siri app earned a spot on
Tech Review's 10 Emerging
Technologies list of 2009, and was
based on AI research conducted for
DARPA.
Smartphones could be a
prime target for a
steganographic attack.
Of course, voice
commands are not exactly
new technology.
The formula is simple: take a
bunch of neat technology that has
never lived up to its promise,
rethink what it's for, do some
secretive hard work, and then
release a natural, retrospectively
obvious experience that redefines
what computers can do.
(C5)
3. IEEE: Interpretación En Español
Smartphones could be a prime target for
a steganographic attack. They are
bloated with personal and sensitive
information and increasingly targeted by
malware. What’s more, steganographic
threats are bigger in instances where
applications offload data to a cloud
server, such as voice-based applications
like Siri.
Desde Luego, La voz por
comando no es nueva
tecnología.
Siri is factible and useless but have a bit
problem, is hacking easy because any
else can interrumted the frecuence and
simplily siri is hacked.
The people need be most unleashed, the
tecnology is’nt the new world, the
tecnology have positive factors and
negative too.
It’s especially difficult in communications
networks, because there are different
types of traffic, different types of
protocols. Each different service is
related to one or a number of protocols,
and each of them can be used for
information hiding.
The researchers acknowledge that there
are plenty of limitations to this trick. For
one, in its current iteration, iStegSiri
requires deep access to Siri so it only
poses a risk to jailbroken iOS devices—
those iPhones and iPads in which
standard proprietary constraints have
been removed, giving the user access to
the operating system’s root kit. It also
requires access to network traffic that
Siri sends to Apple’s cloud servers.
4. IEEE: Education & Entertainment
References / Referencias:
[W1]. Vadel, Neel. Malware Could Steal Data from iPhones Using Siri. http://spectrum.ieee.org/ 16 Jan 2015 | 18:00 GMT.
06/09/2015.
[W2]. Romero, Josh. Apple Debuts New iPhone, Wants You to Talk to It. http://spectrum.ieee.org 4 Oct 2011 | 19:26 GMT.
06/09/2015.
Complete the phrase referenced to text:
Voice command are not the new ___________.
The iPhone 5 series security is ___________.
Much users was ___________ thanks to Siri.
Siri is the iPhone’s ____________ can do works with voice commands.
Smartphones can be a _______________ gun for the people.
Connect the Words (english to spanish mean)
smartphone
Teléfono inteligentetecnology
reference
referencia
tecnología

More Related Content

What's hot

Smartphone security
Smartphone  securitySmartphone  security
Smartphone securityManish Gupta
 
Vulnerabilities Of IoT
Vulnerabilities Of IoT Vulnerabilities Of IoT
Vulnerabilities Of IoT Centextech
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 
Mobile protection
Mobile protection Mobile protection
Mobile protection preetpatel72
 
Design and Implementation of Efficient Integrity Protection for Open Mobile P...
Design and Implementation of Efficient Integrity Protection for Open Mobile P...Design and Implementation of Efficient Integrity Protection for Open Mobile P...
Design and Implementation of Efficient Integrity Protection for Open Mobile P...Vinod Kumar
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khanTajwar khan
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile securityPushkar Pashupat
 
Mobile security
Mobile securityMobile security
Mobile securityMphasis
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsJimmy Shah
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systemsDivya Raval
 
IoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - LyleIoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - Lylewebinos project
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securityguestc03f28
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overviewFabio Pietrosanti
 

What's hot (20)

Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Vulnerabilities Of IoT
Vulnerabilities Of IoT Vulnerabilities Of IoT
Vulnerabilities Of IoT
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Design and Implementation of Efficient Integrity Protection for Open Mobile P...
Design and Implementation of Efficient Integrity Protection for Open Mobile P...Design and Implementation of Efficient Integrity Protection for Open Mobile P...
Design and Implementation of Efficient Integrity Protection for Open Mobile P...
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khan
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
Mobile security
Mobile securityMobile security
Mobile security
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
 
IoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - LyleIoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - Lyle
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 

Viewers also liked

การสร้างวีดีโอจาก Power point
การสร้างวีดีโอจาก Power pointการสร้างวีดีโอจาก Power point
การสร้างวีดีโอจาก Power pointI'am Faii
 
Victorian Bushfires Royal Commission Case Study
Victorian Bushfires Royal Commission Case StudyVictorian Bushfires Royal Commission Case Study
Victorian Bushfires Royal Commission Case StudyRebecca O'Dwyer
 
收藏家的最愛
收藏家的最愛收藏家的最愛
收藏家的最愛neo423
 
Feng Liu | Founder of Siteber
Feng Liu | Founder of SiteberFeng Liu | Founder of Siteber
Feng Liu | Founder of SiteberFeng Liu
 
Algebra booleana taller 1
Algebra booleana taller 1Algebra booleana taller 1
Algebra booleana taller 1Jonathan Castro
 
SMA NEGERI 1 KEJAYAN KAB. PASURUAN
SMA NEGERI 1 KEJAYAN KAB. PASURUANSMA NEGERI 1 KEJAYAN KAB. PASURUAN
SMA NEGERI 1 KEJAYAN KAB. PASURUANadelsoniya13
 
การบริหารโครงการอย่างมีประสิทธิผล 2 วัน
การบริหารโครงการอย่างมีประสิทธิผล  2 วันการบริหารโครงการอย่างมีประสิทธิผล  2 วัน
การบริหารโครงการอย่างมีประสิทธิผล 2 วันDr.Wasit Prombutr
 

Viewers also liked (16)

Ayuda angel
Ayuda angelAyuda angel
Ayuda angel
 
การสร้างวีดีโอจาก Power point
การสร้างวีดีโอจาก Power pointการสร้างวีดีโอจาก Power point
การสร้างวีดีโอจาก Power point
 
Digipack for Media
Digipack for MediaDigipack for Media
Digipack for Media
 
Gamesandhobies
GamesandhobiesGamesandhobies
Gamesandhobies
 
Poslovna revolucija
Poslovna revolucijaPoslovna revolucija
Poslovna revolucija
 
CannabisPDFLinked
CannabisPDFLinkedCannabisPDFLinked
CannabisPDFLinked
 
2015_RESUME_FINAL
2015_RESUME_FINAL2015_RESUME_FINAL
2015_RESUME_FINAL
 
Victorian Bushfires Royal Commission Case Study
Victorian Bushfires Royal Commission Case StudyVictorian Bushfires Royal Commission Case Study
Victorian Bushfires Royal Commission Case Study
 
收藏家的最愛
收藏家的最愛收藏家的最愛
收藏家的最愛
 
Feng Liu | Founder of Siteber
Feng Liu | Founder of SiteberFeng Liu | Founder of Siteber
Feng Liu | Founder of Siteber
 
Conjuntos taller 1
Conjuntos taller 1Conjuntos taller 1
Conjuntos taller 1
 
Annual Review 2010
Annual Review 2010Annual Review 2010
Annual Review 2010
 
Algebra booleana taller 1
Algebra booleana taller 1Algebra booleana taller 1
Algebra booleana taller 1
 
SMA NEGERI 1 KEJAYAN KAB. PASURUAN
SMA NEGERI 1 KEJAYAN KAB. PASURUANSMA NEGERI 1 KEJAYAN KAB. PASURUAN
SMA NEGERI 1 KEJAYAN KAB. PASURUAN
 
Power_DDR_Slides
Power_DDR_SlidesPower_DDR_Slides
Power_DDR_Slides
 
การบริหารโครงการอย่างมีประสิทธิผล 2 วัน
การบริหารโครงการอย่างมีประสิทธิผล  2 วันการบริหารโครงการอย่างมีประสิทธิผล  2 วัน
การบริหารโครงการอย่างมีประสิทธิผล 2 วัน
 

Similar to Malware could steal data from i phones using siri

Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android applicationIAEME Publication
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)sandhibhide
 
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Webrazzi
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsMariano Amartino
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsDario Caliendo
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxvoversbyobersby
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxmariuse18nolet
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 
Vulnerabilities in Mobile Devices
Vulnerabilities in Mobile DevicesVulnerabilities in Mobile Devices
Vulnerabilities in Mobile DevicesCSCJournals
 
Android vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityAndroid vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityCloudCheckr
 
Presentation on iot- Internet of Things
Presentation on iot- Internet of ThingsPresentation on iot- Internet of Things
Presentation on iot- Internet of ThingsJIGAR MAKHIJA
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveRobert Herjavec
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 

Similar to Malware could steal data from i phones using siri (20)

Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
File000092
File000092File000092
File000092
 
776 s0005
776 s0005776 s0005
776 s0005
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
 
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanisms
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanisms
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Vulnerabilities in Mobile Devices
Vulnerabilities in Mobile DevicesVulnerabilities in Mobile Devices
Vulnerabilities in Mobile Devices
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
 
Android vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityAndroid vs. iPhone for Mobile Security
Android vs. iPhone for Mobile Security
 
Presentation on iot- Internet of Things
Presentation on iot- Internet of ThingsPresentation on iot- Internet of Things
Presentation on iot- Internet of Things
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep Dive
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Malware could steal data from i phones using siri

  • 1. Malware Could Steal Data from iPhones Using Siri No. 2015219071 Date /Fecha : 07/09/2015 Authors/ Autores: EDWARD CAMILO PEREA LOPEZ John Alexander Taborda Giraldo 1. IEEE: Introducción En Español Un par de científicos de la computación con sede en Europa han descubierto una vulnerabilidad de seguridad en el iPhone 5, que podría ser explotada por un software malicioso y que pone en peligro la información personal de un usuario. Y el principal factor que hace esto posible es Siri (Reconocimiento de voz del sistema operativo de iPhone “iOS”), según informan en la edición de enero de la IEEE Computer. Boletín de Tecnología Inglés-Español de Estudiantes para Estudiantes Universidad del Magdalena – Santa Marta - Colombia Grupo MAGMA INGENIERÍA – Línea de Investigación en Didáctica de la Ingeniería Rama Estudiantil IEEE Unimagdalena Keywords / Palabras Claves: Cientifics / Cientificos Smartphone / Celular Inteligente Operative System / Sistema Operativo User / Usuario
  • 2. (C1) [W1] (C2) [W2] (C3) [W1] (C4) [W1] (C5) [W2] (C6) [W2] 2. IEEE: Information in English Siri? What are you hiding? On an iPhone, Siri digitally records what the user is saying in the microphone, forms it into packets, sends the packets off to a remote cloud server operated by Apple, and receives a text response that’s relayed to the user. The original Siri app earned a spot on Tech Review's 10 Emerging Technologies list of 2009, and was based on AI research conducted for DARPA. Smartphones could be a prime target for a steganographic attack. Of course, voice commands are not exactly new technology. The formula is simple: take a bunch of neat technology that has never lived up to its promise, rethink what it's for, do some secretive hard work, and then release a natural, retrospectively obvious experience that redefines what computers can do.
  • 3. (C5) 3. IEEE: Interpretación En Español Smartphones could be a prime target for a steganographic attack. They are bloated with personal and sensitive information and increasingly targeted by malware. What’s more, steganographic threats are bigger in instances where applications offload data to a cloud server, such as voice-based applications like Siri. Desde Luego, La voz por comando no es nueva tecnología. Siri is factible and useless but have a bit problem, is hacking easy because any else can interrumted the frecuence and simplily siri is hacked. The people need be most unleashed, the tecnology is’nt the new world, the tecnology have positive factors and negative too. It’s especially difficult in communications networks, because there are different types of traffic, different types of protocols. Each different service is related to one or a number of protocols, and each of them can be used for information hiding. The researchers acknowledge that there are plenty of limitations to this trick. For one, in its current iteration, iStegSiri requires deep access to Siri so it only poses a risk to jailbroken iOS devices— those iPhones and iPads in which standard proprietary constraints have been removed, giving the user access to the operating system’s root kit. It also requires access to network traffic that Siri sends to Apple’s cloud servers.
  • 4. 4. IEEE: Education & Entertainment References / Referencias: [W1]. Vadel, Neel. Malware Could Steal Data from iPhones Using Siri. http://spectrum.ieee.org/ 16 Jan 2015 | 18:00 GMT. 06/09/2015. [W2]. Romero, Josh. Apple Debuts New iPhone, Wants You to Talk to It. http://spectrum.ieee.org 4 Oct 2011 | 19:26 GMT. 06/09/2015. Complete the phrase referenced to text: Voice command are not the new ___________. The iPhone 5 series security is ___________. Much users was ___________ thanks to Siri. Siri is the iPhone’s ____________ can do works with voice commands. Smartphones can be a _______________ gun for the people. Connect the Words (english to spanish mean) smartphone Teléfono inteligentetecnology reference referencia tecnología