Frame-2085666935

Blind Spot Audit

Spot Fraud in your approved Customers

Runs On Your CloudRuns On Your Cloud

No Data SharingNo Data Sharing

No Contract RequiredNo Contract Required

Frame-2085666935

Deepfake Detection

Check where deepfake IDs slipped
through your stack.

Runs On Your CloudRuns On Your Cloud

No Data SharingNo Data Sharing

No Contract RequiredNo Contract Required

Frame-2085666935

Liveness Detection

Find the replay gaps in your passed
liveness checks.

Runs On Your CloudRuns On Your Cloud

No Data SharingNo Data Sharing

No Contract RequiredNo Contract Required

Frame-2085666935

Document Deepfake Detection

Spot synthetic documents hiding in
verified users.

Runs On Your CloudRuns On Your Cloud

No Data SharingNo Data Sharing

No Contract RequiredNo Contract Required

Frame-2085666935

Document Originality Detection

Stop fake documents before they pass.

Runs On Your CloudRuns On Your Cloud

No Data SharingNo Data Sharing

No Contract RequiredNo Contract Required

.

Introducing Blind Spot Audit. Spot AI-generated forgeries with advanced document analysis. Teg-1 Run Now on AWS right-arrow-2

Introducing Blind Spot Audit Teg-1

Spot AI-generated forgeries with advanced document analysis.

Run Now right-arrow-2
.

Introducing Deepfake Detection. Detect deepfakes with precision your stack has missed. Teg-1 Run Now on AWS right-arrow-2

Introducing Deepfake DetectionTeg-1

Detect deepfakes with precision your stack has missed.

Run Now right-arrow-2
.

Introducing Liveness Detection. Detect spoofs with technology built for sophisticated fraud. Teg-1 Run Now on AWS right-arrow-2

Introducing Liveness DetectionTeg-1

Detect spoofs with technology built for sophisticated fraud.

Run Now right-arrow-2
.

Introducing Document Deepfake Detection. Spot AI-generated forgeries with advanced document analysis. Teg-1 Run Now on AWS right-arrow-2

Introducing Document Deepfake DetectionTeg-1

Spot AI-generated forgeries with advanced document analysis.

Run Now right-arrow-2
.

Introducing Document Originality Detection. Verify document authenticity before your next audit. Teg-1 Run Now on AWS right-arrow-2

Introducing Document Originality DetectionTeg-1

Verify document authenticity before your next audit.

Run Now right-arrow-2

us

216.73.216.173

New ultrasonic hack can manipulate your digital assistant

ultrasonic

Researchers are advising consumers about a new type of hack that has recently emerged. It involves the use of smart digital assistants like Google’s Alexa or Apple’s Siri. The hack called a “SurfingAttack” involves the use of ultrasonic guided waves that are unnoticeable to the human ear to communicate with the voice assistant using a device. It could target Ring services with door deadbolts attached or move the temperature dial on your thermostat.

The hack enables interactions between the hacker and a voice-controlled device over long distances, even if the device is not in sight. The signals could even be transmitted through a solid surface, such as a table.

 

“Humans cannot hear anything, but the voice assistants will interpret these ultrasonic sounds as a voice command, and conduct certain operations because of it,” said Qiben Yan, an assistant professor at Michigan State University’s Secure and Intelligent Things Lab and a key investigator on the project. “Sending the commands to the voice assistance, we can basically control the voice assistant. There’s a lot of opportunities for this when people put their phones down on a table and leave them unattended.”

Yan stated that hackers could initiate conversations with the victim’s contacts, and if their devices are connected, possibly control home devices, lock or unlock doors and alter the thermostat. Such attacks could also affect two-factor authentication, by reading the security code sent through text message back to the hacker. 

 

Using a $5 off-the-shelf PZT transducer, a type of electroacoustic transducer, the researchers were able to successfully compromise a wide range of devices such as iPhone X, iPhone 6+, iPhone 5, Samsung S9, Samsung S7, Google Pixel 3, Google Pixel 2, among many others. It is believed that more devices could be at risk, including phones protected by silicone rubber phone cases.

 

There are a number of steps people can take in order to prevent such attacks from taking place. Disabling the voice assistance when your phone is locked, or ensuring your phone is on a covering such as a tablecloth, can stop the ultrasonic ways from affecting it. Using phone cases of uncommon materials like wood can also help.

Related Posts

News

EU-Wide Social Media Age Limit Pushed by Dutch Coalition Partners

EU-Wide Social Media Age Limit Pushed by Dutch Coalition Partners

Explore More

News

Meta Blocks 544,000+ Accounts Under Australia’s Social Media Ban

Meta Blocks 544,000+ Accounts Under Australia’s Social Media Ban

Explore More

News

Ireland Calls for Compulsory ID Verification on Social Platforms Across the EU

Ireland Calls for Compulsory ID Verification on Social Platforms Across the EU

Explore More

News

France Targets Under-15 Social Media Use With Mandatory Age Verification For 2026

France Targets Under-15 Social Media Use With Mandatory Age Verification For 2026

Explore More

News

Malaysia Aims for 95% Public Service Integration With MyDigital ID By 2030

Malaysia Aims for 95% Public Service Integration With MyDigital ID By 2030

Explore More

News

Germany’s eID Under Scrutiny as EU Digital Identity Wallet Deadline Nears

Germany’s eID Under Scrutiny as EU Digital Identity Wallet Deadline Nears

Explore More

News

Federal Judge Blocks Louisiana Social Media Age Verification Law Ahead of Enforcement

Federal Judge Blocks Louisiana Social Media Age Verification Law Ahead of Enforcement

Explore More

News

EU-Wide Social Media Age Limit Pushed by Dutch Coalition Partners

EU-Wide Social Media Age Limit Pushed by Dutch Coalition Partners

Explore More

News

Meta Blocks 544,000+ Accounts Under Australia’s Social Media Ban

Meta Blocks 544,000+ Accounts Under Australia’s Social Media Ban

Explore More

News

Ireland Calls for Compulsory ID Verification on Social Platforms Across the EU

Ireland Calls for Compulsory ID Verification on Social Platforms Across the EU

Explore More

News

France Targets Under-15 Social Media Use With Mandatory Age Verification For 2026

France Targets Under-15 Social Media Use With Mandatory Age Verification For 2026

Explore More

News

Malaysia Aims for 95% Public Service Integration With MyDigital ID By 2030

Malaysia Aims for 95% Public Service Integration With MyDigital ID By 2030

Explore More

News

Germany’s eID Under Scrutiny as EU Digital Identity Wallet Deadline Nears

Germany’s eID Under Scrutiny as EU Digital Identity Wallet Deadline Nears

Explore More

News

Federal Judge Blocks Louisiana Social Media Age Verification Law Ahead of Enforcement

Federal Judge Blocks Louisiana Social Media Age Verification Law Ahead of Enforcement

Explore More

Take the next steps to better security.

Contact us

Get in touch with our experts. We'll help you find the perfect solution for your compliance and security needs.

Contact us

Request demo

Get free access to our platform and try our products today.

Get started
Shufti-tick

Thanks For Your Submission.

    close-form

    Run Document Deepfake on AWS

    Let’s get you to the right place

    Email*

    Trusted by 2,000+ Clients Worldwide