INTELLIGENT ASSISTANTS. WHAT ARE THEY?
The new revolution in technology are the intelligent assistants or IPA’S (Intelligent Personal Assistants) that consist of an application attached to a device (mobile, tablet, computer) that allows to perform predetermined actions by voice commands.
These intelligent assistants use the technology ASR (Automatic Speech Recognition) for the recognition of speech and for the understanding of the language of the users, the NLU (Natural languaje Understanding). These technologies work together to listen passively and understand the language that the user habitually uses.
They also generate benefits for the user, facilitating their everyday and avoiding waste time with daily operations. They are capable to write or read an email, make calls or turn on different devices in the house.
However, intelligent assistants also involves a lot of danger, they are targeted by cybercriminals. Due to the ease of attacking them, the Internet Security Office (OSI) warns of the risks to which these intelligent assistans are exposed.
Keep in mind that the user gives access to the assistants to a lot of personal information such as contacts, calendar or emails. This information is obtained with voice commands that can be activated by people with the same tone of voice or using the same intonation.
Another risk that exists is the possibility of activating the assistants using low frequency sound waves that the human ear can not grasp or the use of interlaced phrases that contain the activation word.
Also the passive voice of these devices recognizes at all times what users are talking. Sometimes the user is not aware of what data is being collected by the device and to what extent privacy is violated . It should be noted that the assistant recognizes the voice not only of the user but also of the people around him / her.
RECOMMENDATIONS FOR YOUR USE
Finally to prevent possible violations in intelligent assistants we recommend that you follow the following tips:
- Configure the wizard to recognize only the voice of the owner or the people that he authorizes.
- Disable functions that are not commonly used.
- Set passwords for those functions that may contain sensitive personal information.
- Modify the activation word that comes by default.
- Protect all devices with at least WPA2 and robust passwords .
- Deactivate, when not in use, the passive listening of the assistant to prevent it from being activated by mistake.
- Read the privacy policies to know what information the assistant collects and stores.
- Keep updated the software of the assistant and the programs that it uses.
- Do not disseminate confidential or personal information through the attendees.
Do you use intelligent assistants? Did you know about these dangers?
Marina Córdoba | Marketing Digital Assistant at R3 CyberSecurity