• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Hackers Can Use Lasers to ‘Speak’ to Your Amazon Echo or Google Home

November 9, 2019 by William Ha 1 Comment

Cybersecurity researcher Takeshi Sugawara found that it’s possible to make microphones respond to light as if it were sound. By pointing a laser at the microphone and changing the intensity, the light somehow influences the microphone’s membrane at the same frequency as the laser. The researchers then changed the intensity of the laser to match the frequency of a human’s voices to “speak” to the voice-activated devices. They found that all almost all the smart devices tested registered commands from up to 164 feet away. This has the potential to allow threat actors to purchase items and unlock doors silently through your window. The researchers even tried using infrared lasers, which are invisible to the naked eye, and found that it worked to activate certain smart devices. There are technical controls to prevent this, such as voice authentication and PIN numbers, but the best thing to do is keep the device out of the line of sight of any potential threats.

https://www.wired.com/story/lasers-hack-amazon-echo-google-home/

Filed Under: Week 11: Intro to Dark Web and Intro to Cloud Tagged With:

Reader Interactions

Comments

  1. Jaimin Pandya says

    November 11, 2019 at 10:02 am

    This is an interesting one. Thanks for sharing this. Like the joker says – “It’s getting crazy out there” Haha

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in