Cyber criminals have shown their interest and ability to hack cameras of laptops and cameras in other devices in the past. It wouldn't be odd if they keep working hard to hack those of the smart home networks. That's just a simple example, while other devices of a smart home give them much more chances.
We review the latest news and developments in face recognition technologies, which are used to identify users and authenticate logins leading to better privacy and security.
Microphone non-linearity is recognized as a gateway for establishing secret communication channels and as a malicious backdoor for injecting hidden voice commands. In the previous article, Ultrasonic Jammers: All You Need to Know, some representative microphones jamming methods were explained - like RF jammers, audio jammers and ultrasonic jammers.