Too Long; Didn't Read
Protego’s Head of Security and Ethical Hacker, Tal Melamed, demonstrates how a simple SQL injection can be executed through a verbal command in order to gain unauthorized access to sensitive account data. The tried and true SQL injection attack has is now voice-enabled, now it is easier than ever for hackers to perform such hacks into a variety of applications, just using their voice. Any application that was potentially susceptible to an attack by text input (think a hacker and a keyboard) would be susceptible to a voice-based attack.
Share Your Thoughts