{"id":46993,"date":"2015-10-15T10:33:58","date_gmt":"2015-10-15T17:33:58","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=46993"},"modified":"2015-10-15T15:01:40","modified_gmt":"2015-10-15T22:01:40","slug":"ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/","title":{"rendered":"Ingenious Attack Shows How Siri Could Be Hijacked Silently from 16 Feet Away, but Don&#8217;t Lose Any Sleep"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-46996\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/siri-600x300.jpeg\" alt=\"Siri\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/siri-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/siri-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/siri-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>It&#8217;s been four years since Apple introduced Siri, putting a mini-secretary into every iPhone owners&#8217; pocket.<\/p>\n<p>I know it&#8217;s made my day-to-day life easier \u2014 providing an easy way to reply to an SMS text message while I&#8217;m on the move, or letting me set the timer when my fingers are mucky from cooking in the kitchen. But the technology has also been at the heart of a number of security problems, most recently providing a sneaky way to <a href=\"https:\/\/grahamcluley.com\/2015\/09\/ios-iphone-lockscreen\/\" target=\"_blank\">bypass the iOS 9 lock screen<\/a>.<\/p>\n<p>Well now, French security researchers appear to have uncovered a whole different way in which Siri (and, to be fair, Google Now on Android phones) could potentially be exploited by hackers to hijack control of your smartphone, without you ever realising that any funny business was afoot.<\/p>\n<p>Now, it&#8217;s important to stress that this is a *potential* problem. Although quite ingenious, when you hear the details of just what the researchers had to do, and how the iPhone has to be prepared before a successful attack can proceed, you will probably decide that this particular threat is not one to lose much sleep about.<\/p>\n<p>But that doesn&#8217;t make it any less fascinating.<\/p>\n<p>In a <a title=\"Link to paper on IEEE website\" href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?reload=true&amp;arnumber=7194754\" target=\"_blank\" rel=\"nofollow\">technical paper<\/a> published by IEEE, a team from the French government&#8217;s Network and Information Security Agency (ANSSI), claims to have discovered &#8220;a new silent remote voice command injection technique,&#8221; which could allow them to control Siri via radio waves from a distance of up to 16 feet, if \u2014 and this is crucial \u2014 a pair of headphones with an\u00a0in-built microphone (such as the standard earbuds shipped by Apple) are plugged into the iPhone.<\/p>\n<p>Armed with an amplifier, laptop, antenna and Universal Software Radio Peripheral (USRP) radio, attackers could apparently send surreptitious signals, that the headphones&#8217; cord would pick up like an antenna, and converted into the electrical signals understood as speech by the iDevice&#8217;s operating system.<\/p>\n<p>Although somewhat unlikely and impractical, it is quite ingenious.<\/p>\n<p>No words have been spoken, and yet Siri has received a command.<\/p>\n<p>Perhaps the most plausible abuse of the French researchers&#8217; discovery would be to order iOS to visit a particular website, hosting a malicious exploit that could infect the phone and install malware. Alternatively, unauthorised messages could be sent from the compromised device.<\/p>\n<p>In a demonstration video, the researchers showed how they were able to transmit silent commands to an Android Smartphone, forcing it to visit the ANSSI website.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/jLuMk7qGcJs?version=3&#038;rel=0&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/p>\n<p>However, there are additional limitations for the attack to work against iPhones. Not only does Siri need to be enabled with Voice Activation turned on to allow &#8216;Hey Siri&#8221;, and headphones with a built-in microphone need to be plugged into the targeted device, but also the hardware required to perform the attack is not insubstantial.<\/p>\n<p>Indeed, the researchers say that in its smallest form (which can fit inside a backpack) the range is limited to about 6.5 feet. A more powerful version that\u00a0would require larger batteries could only fit practically inside a car or van, giving a range of 16 feet or more.<\/p>\n<p>Regardless, as <em>Wired<\/em> <a title=\"Link to WIred article\" href=\"http:\/\/www.wired.com\/2015\/10\/this-radio-trick-silently-hacks-siri-from-16-feet-away\/\" target=\"_blank\" rel=\"nofollow\">reports<\/a>, the researchers believe that the vulnerability could create a real security headache:<\/p>\n<blockquote><p>&#8220;The possibility of inducing parasitic signals on the audio front-end of voice-command-capable devices could raise critical security impacts,&#8221; the two French researchers, Jos\u00e9 Lopes Esteves and Chaouki Kasmi, write in a paper published by the IEEE. Or as Vincent Strubel, the director of their research group at ANSSI puts it more simply, &#8220;The sky is the limit here. Everything you can do through the voice interface you can do remotely and discreetly through electromagnetic waves.&#8221;<\/p><\/blockquote>\n<p>I would agree that, potentially, anything that can be said to Siri could, in theory, be sent secretly through radio waves, but I think there&#8217;s quite a jump between that and describing it as &#8220;inducing parasitic signals.&#8221;<\/p>\n<p>&#8220;Parasitic&#8221; implies some malware-like component and, as we all know, it has proven to be immensely difficult for hackers to infect iPhones with malicious code without going to the effort of jailbreaking or exploiting the <a title=\"Link to Apple enterprise provisioning\" href=\"https:\/\/developer.apple.com\/programs\/enterprise\/how-it-works\/\" target=\"_blank\" rel=\"nofollow\">enterprise provisioning feature<\/a> that Apple provides for companies who wish to roll out their own apps to staff.<\/p>\n<p>That&#8217;s why threats such as the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/\" target=\"_blank\">YiSpecter iOS malware<\/a>, which managed to creep into the App Store, are so rare and had to use such a convoluted route to get there.<\/p>\n<p>I don&#8217;t see why the introduction of remote Siri commands necessarily significantly increases the risks of iPhones and iPads becoming infected.<\/p>\n<p>Of course, if you&#8217;re an Android user \u2014 particularly one who has found it problematic to update your operating system with the latest patches, and who might be of interest to intelligence agencies willing to attempt an attack like this \u2014 then you may be more at risk.<\/p>\n<p>My advice? If you&#8217;re concerned, consider\u00a0turning off Siri when your phone is locked or at least disabling Voice Activation. And, furthermore, unplug your headphones when you&#8217;re not using them!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If no words are spoken, how could hackers send Siri a command?<\/p>\n<p>French researchers have uncovered an ingenious &#8211; albeit somewhat impractical &#8211; way to hijack control of someone else&#8217;s iPhone.<\/p>\n","protected":false},"author":34,"featured_media":47002,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13,5],"tags":[69,106,645],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"If no words are spoken, how could hackers send Siri a command?  French researchers have uncovered an ingenious - albeit somewhat impractical - way to hijack control of someone else&#039;s iPhone.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ingenious Attack Shows How Siri Could Be Hijacked Silently from 16 Feet Away, but Don&#039;t Lose Any Sleep - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"If no words are spoken, how could hackers send Siri a command?  French researchers have uncovered an ingenious - albeit somewhat impractical - way to hijack control of someone else&#039;s iPhone.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-15T17:33:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-10-15T22:01:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/siri-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/siri-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/siri-400x260.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/\",\"name\":\"Ingenious Attack Shows How Siri Could Be Hijacked Silently from 16 Feet Away, but Don't Lose Any Sleep - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#primaryimage\"},\"datePublished\":\"2015-10-15T17:33:58+00:00\",\"dateModified\":\"2015-10-15T22:01:40+00:00\",\"description\":\"If no words are spoken, how could hackers send Siri a command? French researchers have uncovered an ingenious - albeit somewhat impractical - way to hijack control of someone else's iPhone.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ingenious Attack Shows How Siri Could Be Hijacked Silently from 16 Feet Away, but Don&#8217;t Lose Any Sleep\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Ingenious Attack Shows How Siri Could Be Hijacked Silently from 16 Feet Away, but Don&#8217;t Lose Any Sleep\",\"datePublished\":\"2015-10-15T17:33:58+00:00\",\"dateModified\":\"2015-10-15T22:01:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#webpage\"},\"wordCount\":839,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/siri-400x260.jpeg\",\"keywords\":[\"iOS\",\"Privacy\",\"Siri\"],\"articleSection\":[\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"If no words are spoken, how could hackers send Siri a command?  French researchers have uncovered an ingenious - albeit somewhat impractical - way to hijack control of someone else's iPhone.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/","og_locale":"en_US","og_type":"article","og_title":"Ingenious Attack Shows How Siri Could Be Hijacked Silently from 16 Feet Away, but Don't Lose Any Sleep - The Mac Security Blog","og_description":"If no words are spoken, how could hackers send Siri a command?  French researchers have uncovered an ingenious - albeit somewhat impractical - way to hijack control of someone else's iPhone.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-10-15T17:33:58+00:00","article_modified_time":"2015-10-15T22:01:40+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/siri-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/siri-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/siri-400x260.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/","name":"Ingenious Attack Shows How Siri Could Be Hijacked Silently from 16 Feet Away, but Don't Lose Any Sleep - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#primaryimage"},"datePublished":"2015-10-15T17:33:58+00:00","dateModified":"2015-10-15T22:01:40+00:00","description":"If no words are spoken, how could hackers send Siri a command? French researchers have uncovered an ingenious - albeit somewhat impractical - way to hijack control of someone else's iPhone.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Ingenious Attack Shows How Siri Could Be Hijacked Silently from 16 Feet Away, but Don&#8217;t Lose Any Sleep"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Ingenious Attack Shows How Siri Could Be Hijacked Silently from 16 Feet Away, but Don&#8217;t Lose Any Sleep","datePublished":"2015-10-15T17:33:58+00:00","dateModified":"2015-10-15T22:01:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#webpage"},"wordCount":839,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/siri-400x260.jpeg","keywords":["iOS","Privacy","Siri"],"articleSection":["Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/ingenious-attack-shows-how-siri-could-be-hijacked-silently-from-16-feet-away-but-dont-lose-any-sleep\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/siri-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-cdX","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/46993"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=46993"}],"version-history":[{"count":9,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/46993\/revisions"}],"predecessor-version":[{"id":47032,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/46993\/revisions\/47032"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/47002"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=46993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=46993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=46993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}