Get a Pentest and security assessment of your IT network.

News

Researchers Crack Siri Protocol

Researchers reverse-engineered the language processing, interactive personal assistant application called Siri. The iPhone 4S communicates with a server at Apple over HTTPS for Siri messages, so the researchers figured out a way to take advantage of that setup. The researchers did not publish their 4S identifier (for obvious reasons) Apple could blacklist fake identifiers, but they contend this is unlikely if you are running the application for personal use. If you actually want to install Siri on your non-4S device you ll still need an 4S ID.

Source: https://threatpost.com/researchers-crack-siri-protocol-111511/75896/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Webroot Impact of Web-borne threats on businesses

News

UK NCSC warns of cyber attacks powered by Russia against the political system