In the above video, you’ll notice the researcher issues the voice command and then unlocks the PC with their password. The vulnerability doesn’t allow a bad actor to unlock your computer, but with physical access to your system they could direct it to just about any website they wanted.
- class ThreadDemo extends Thread {
-
- private String threadName;
-
- ThreadDemo( String name) {
- threadName = name;
- System.out.println("Creating " + threadName );
- }
-
- public void run() {
- System.out.println("Running " + threadName );
- try {
- for(int i = 4; i > 0; i--) {
- System.out.println("Thread: " + threadName + ", " + i);
-
- Thread.sleep(50);
- }
- }catch (InterruptedException e) {
- System.out.println("Thread " + threadName + " interrupted.");
- }
- System.out.println("Thread " + threadName + " exiting.");
- }
- }
- public class TestThread {
- public static void main(String args[]) {
- ThreadDemo T1 = new ThreadDemo( "Thread-1");
- T1.start();
-
- ThreadDemo T2 = new ThreadDemo( "Thread-2");
- T2.start();
- }
- }