This could potentially affect any device that uses voice commands, although is mainly aimed at mobile phone users (all platforms). I wonder if it's worth adding a 'Mobile Security' section to the 'Mobile Phones, Tablets and other Gadgets section'? as that would have been more appropriate at this time, although I can foresee more computer users installing voice command software in the future. Even if the system allows the user to customise the voice command wording for any particular task, most people will stick with the default which makes it easier for hackers. (">

-------------------------------------------------------------------
Gone are the days where a hacker would try steal your bank password or PIN numbers—your data is what a hacker is really looking for. Yes, he is mining for your data, which could be turn out to be gold for him. If you hold private photos on your smartphone, or sensitive documents, it could make a hacker rich overnight. While nude pics and selfies could bring him a substantial amount of money from porn websites, your sensitive documents could fetch him a good amount too. All this data could be used for making money or could also be used against you. However, to get his hands on your data, he needs to have physical access to your device. The other way is to get it through an online route via the internet. A simple malicious code sent to your smartphone can do the trick and help the hacker get all the information on your smartphone without your knowledge. However, though it is not as easy as it sounds, it is still highly possible if the hacker has the right tools and outsmarts you.

http://www.deccanchronicle.com/techn...martphone.html