{"id":37544,"date":"2020-10-07T13:02:06","date_gmt":"2020-10-07T13:02:06","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\/"},"modified":"2020-10-07T13:02:06","modified_gmt":"2020-10-07T13:02:06","slug":"infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\/","title":{"rendered":"Infosec researchers pwned Comcast&#8217;s voice-activated remote control so it could snoop on household chit-chat"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/09\/01\/shutterstock_static_tv.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>A voice-activated TV remote can be turned into a covert home surveillance device, according to researchers from infosec firm Guardicore who probed the device to show that a man-in-the-middle attack could compromise it.<\/p>\n<p>Guardicore discovered an attack vector on US telco giant Comcast&#8217;s Xfinity XR11 voice remote \u2013 of which around 18 million units have been sold \u2013 that allowed malicious people to turn it into an eavesdropping device.<\/p>\n<p>Dubbing the attack method WarezTheRemote, researchers explained that the clicker&#8217;s use of RF spectrum to communicate with its set-top box \u2013 instead of the traditional infrared systems used for telly remotes \u2013 gave them a way to use its microphone to snoop on private conversations in the home.<\/p>\n<p>The firm said <a target=\"_blank\" href=\"https:\/\/www.guardicore.com\/2020\/10\/wareztheremote-turning-remotes-into-listening-devices\/\" rel=\"noopener noreferrer\">in a blog post<\/a>: &#8220;The attack did not require physical contact with the targeted remote or any interaction from the victim \u2013 any hacker with a cheap RF transceiver could have used it to take over an XR11 remote. Using a 16dBi antenna, we were able to listen to conversations happening in a house from about 65 feet [<i>about 20m<\/i>] away. We believe this could have been amplified easily using better equipment.&#8221;<\/p>\n<p>Using research from the <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/iisp.gatech.edu\/cabletap-wirelessly-tapping-your-home-network\">CableTap project<\/a>, Guardicore realised the remotes automatically polled their paired, internet-connected set-top boxes for firmware updates. CableTap found that those firmware images did not need to be signed for the remote to install them.<\/p>\n<p>A vulnerability in the protocol the remote used to talk to the set-top box (Radio Frequency for Consumer Electronics, RF4CE; derived from a standard published by IoT bods <a target=\"_blank\" href=\"https:\/\/zigbeealliance.org\/solution\/rf4ce\/\" rel=\"noopener noreferrer\">Zigbee<\/a>) allowed the researchers to reflash the remote&#8217;s firmware.<\/p>\n<p>They explained: &#8220;The vulnerability was that the original XR11 firmware didn&#8217;t verify that responses to encrypted requests are encrypted as well. This means that if an attacker within RF range had responded to outgoing (encrypted) requests from the remote in plaintext, the remote would have accepted the spurious responses.&#8221;<\/p>\n<p>Using this, the researchers were able to spoof the set-top box that the target remote was paired with and upload their own firmware to it. Once that was loaded into the remote (achieved in &#8220;35 minutes&#8221;) and access to the microphone and the built-in recording feature had been achieved, they started experimenting to find out how far away the microphone\u2019s transmissions could be picked up. It turned out to be quite a long way indeed.<\/p>\n<p>Using a 16dBi antenna, Guardicore was able to reliably pick up the mic from 65 feet away \u2013 raising the spectre of someone malicious sitting outside your home, in a van, eavesdropping on your sofa conversations through your remotely pwned remote control.<\/p>\n<p>Comcast has since patched the remote to <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.xfinity.com\/support\/articles\/update-your-xfinity-equipment-online\">version 1.1.4.0<\/a>. Updating is achieved through one&#8217;s set-top box. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/10\/07\/comcast_xr11_voice_remote_pwnable\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Own one of those Xfinity XR11 TV zappers? You better get patching A voice-activated TV remote can be turned into a covert home surveillance device, according to researchers from infosec firm Guardicore who probed the device to show that a man-in-the-middle attack could compromise it.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":37545,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-37544","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Infosec researchers pwned Comcast&#039;s voice-activated remote control so it could snoop on household chit-chat 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infosec researchers pwned Comcast&#039;s voice-activated remote control so it could snoop on household chit-chat 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-07T13:02:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Infosec researchers pwned Comcast&#8217;s voice-activated remote control so it could snoop on household chit-chat\",\"datePublished\":\"2020-10-07T13:02:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\\\/\"},\"wordCount\":463,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\\\/\",\"name\":\"Infosec researchers pwned Comcast's voice-activated remote control so it could snoop on household chit-chat 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat.jpg\",\"datePublished\":\"2020-10-07T13:02:06+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat.jpg\",\"width\":648,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infosec researchers pwned Comcast&#8217;s voice-activated remote control so it could snoop on household chit-chat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infosec researchers pwned Comcast's voice-activated remote control so it could snoop on household chit-chat 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\/","og_locale":"en_US","og_type":"article","og_title":"Infosec researchers pwned Comcast's voice-activated remote control so it could snoop on household chit-chat 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-10-07T13:02:06+00:00","og_image":[{"width":648,"height":432,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Infosec researchers pwned Comcast&#8217;s voice-activated remote control so it could snoop on household chit-chat","datePublished":"2020-10-07T13:02:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\/"},"wordCount":463,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\/","url":"https:\/\/www.threatshub.org\/blog\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\/","name":"Infosec researchers pwned Comcast's voice-activated remote control so it could snoop on household chit-chat 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat.jpg","datePublished":"2020-10-07T13:02:06+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat.jpg","width":648,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/infosec-researchers-pwned-comcasts-voice-activated-remote-control-so-it-could-snoop-on-household-chit-chat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Infosec researchers pwned Comcast&#8217;s voice-activated remote control so it could snoop on household chit-chat"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37544"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37544\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/37545"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}