Siri Alexa Cortana name meaning revealed - Siri. Alexa. Google. Cortana ... digital assistants, born thanks to machine learning and Artificial intelligence and created by the world's largest technology companies have become part of our daily routine, and despite their huge unstoppable success, the vast majority of people are unaware of the history behind their names.

In almost all cases, other names were considered before the definitive one that has come to our days: Cortana is almost called Alyx and Steve Jobs did not like the name of Siri. In fact, the reason why names like Siri, Cortana and Alexa prevailed has often had more to do with Chance and circumstances than with a particular marketing or marketing decision.

Consistent with the brand and easy to remember. This should be the name virtual assistants: unique, but with the ability to stick to memory, simple pronunciation and short extension. The X in the center of Alexa gives it sonority, while the cadence in three syllables of Cortana causes a simple memorization thanks to the repetition of the same vowel.

Behind the best known will come others: it is rumored that the new assistant Samsung will be called Bixby, Nokia is working on its proposal called Viki and they say that Facebook does the same with a virtual assistant in beta phase baptized as "M".

Siri Alexa Cortana name meaning revealed

But now, let's get to know the stories of the world's most famous digital assistants.


The inspiration for its creation came from science fiction, specifically from The Star Trek universe. Its name, according to the David Limp, the senior vice president of Amazon, sinks its roots in the intention to evoke the legendary library of Alexandria of ancient Egypt with a magnetic name

During the conference Fortune Brainstorm Tech revealed that in brainstorming they sought to build a personality relevant to their Artificial intelligence assistant. The phonetics of the word accentuates its power and in addition, it is one of the most “human” names of digital assistants.

As a curiosity, the name "Alexa" ranked 32nd on its list of the 1,000 most popular person names in 2015, with 6,029 newborns sharing a name with the Amazon Assistant, for their Amazon Echo device.


Surely, Apple's is the most famous of the digital assistants, Siri was originally created as part of a massive Artificial intelligence project of the US military organization DARPA. ” We wanted something easy to remember, short when it comes to writing, comfortable to pronounce and not too common, as well as getting a cheap domain, " Siri co-founder Adam Cheyer told Quora magazine.

In Nordic, Siri means " beautiful woman who leads you to victory "- something that dazzled the CEO of Siri Dig kittalus, Norwegian-while in swahili it means "secret," something Cheyer loved for its connection to Apple's mysteries.

Although Steve Jobs was not in favor of the name, the team did not agree on a better alternative. “It was a huge surprise for the team that Apple decided to keep the original Siri name for launch as part of iOS, " Cheyer said.


The Microsoft virtual assistant did not seem destined to be baptized as Cortana and the praise of users had much to do with its finality in fact, Cortana was simply the internal code name given to the project in its early days. ” It was just a code name to start with, " recalls Deborah Harrison, one of the first members of Cortana's editorial team.

It so happened that, like many other secret projects, Cortana's name leaked, receiving an unexpectedly warm response from consumers to the idea of a digital assistant named Cortana. The fans were so excited that they asked Microsoft to keep it. ” People are really willing to buy a Windows Phone if the Personal Assistant is called Cortana, " Harrison said.

The Microsoft member points out that the name worked because its cadence is extremely correct for recognition, differentiating itself clearly from other words that the user may be saying near the device. After considering alternatives such as Naomi or Alyx, the company accepted and Cortana made its public debut in April 2014.

Google Assistant

Google, both with Google Assistant and previously with Google Now, reverses the trend of humanizing digital helpers by baptizing them with personal names. Your Assistant has that name theoretically so unoriginal or tasteless for weight reasons, as it is part of a much larger strategy.

With its virtual assistant, the company wants to emphasize its own services and technology, not the concept of an assistant itself. What tech wants is for people to think of their assistant as an extension of their search engine and other products, rather than a separate and independent product with its own personality.

End of: Siri Alexa Cortana name meaning revealed

More on:

Cybercriminals don't need passwords to steal from companies: these are some of the new computer attacks, according to well-known hacker Chema Alonso

Cybercriminals do not need to steal a password to attack a company and steal large amounts of money.

This is the conclusion of a webinar in which the well-known Spanish hacker Chema Alonso, head of digital client (Cdco, for its acronym in English) of Telefónica has participated.

The online seminar was held this summer as part of the Finance Summit organized by VMware technology for its audience in Mexico. The paper, which you can view on YouTube through this link, reviews some trends in the world of cybercrime.

"All of you who are within a company and manage money have to assume that the probability of being attacked is 100%," notes the expert in computer security. "Cybercriminals are cybercriminals and what they are going to look for is to get their goal met: to make money through cybercrime."

Alonso took part of the presentation to recall the differences between hacker and cybercriminal: while the former is a person with extensive knowledge who tries to take technology "beyond its limits", the latter are true professionals who seek to violate the computer defenses of a company with a desire for profit.

"Cybercriminals will take advantage of any advances in technology that serve them to achieve their goal, they are usually very informed," he said. So much so that, in the face of what is commonly expected —in the world of cybersecurity it is essential to have secure passwords-many cybercriminals do not need these credentials to carry out their operations.

The paper, entitled How Bad Guys Hack Good (Financial) People with State of Art Technology, reviews with several real cases how are the new cyber attacks that are perpetrating many cybercriminals against companies.

Alonso starts by exposing the example of the historic hack to Twitter. What is known about this computer attack is that some minors are being investigated for having managed to access the management platforms of the social network by deceiving an employee of the company.

Once they accessed such platforms, the hackers managed to impersonate dozens of Twitter accounts of American celebrities, including former US President Barack Obama, by publishing a cryptocurrency fraud through which they managed to defraud just over $ 100,000.

He then detailed two real cases of which he himself had direct knowledge.

The first tells the story of a client of a bank branch that, thanks to the degree of trust he had with the employees of the same, began to operate his account from home and via email. This meant that when placing an order to the bank by e-mail, there was no electronic signature validating the transactions.

However, as the client and one of the workers spoke frequently on the phone, there was no greater problem.

That's right: the problem eventually came. One good day, the client found an email in his inbox. The mail provider warned you that someone had tried to access your account. Soon after, the employee of the bank branch called him: he wanted to confirm what was due to the transfer of 19,000 euros to a foreign country that the client had allegedly just ordered.

The client had not ordered anything; a cybercriminal had been reading for days the electronic correspondence between the client and the bank and tried to impersonate the client even by his writing.

Alonso narrates another second case, something more sophisticated, and involving two companies. He refers to them as Company ' A ' and Company 'B'. The first is the provider of the second.

An administrative officer leaves on vacation and on his return realizes that company ' B ' has not paid for 'A' services either in time or form. When you are going to claim, Company ' B ' replies that they have already made the transfer: they attach vouchers and even the emails that were crossed... with him, I had been on vacation.

Indeed, the transfer was made: to a bank account of a foreign country. And a cybercriminal had managed to impersonate the worker who was on vacation in order to fraudulently receive the payment.

Alonso is concerned about the amount of information a company's employees can leave on the net.

In fact, the hacker from Telefónica has a solution of his own called Dirty Business Card Reader. This is a computer program that can read the business cards of workers and executives and, in a matter of minutes, collect all the information available on the network about that person.

If you have your e-mail or social media on your business card, you may think that you are doing so that whoever receives it contacts you. Actually, it's also a gateway to cyberattacks.

The reason is none other than an email is not just an address: it is also the user you will put to access your company's systems or to access, perhaps, the accounts on social networks in which the person in question has registered.

Alonso's program is even able to try to register that email from a business card on random pages or networks to detect if the person using that email has accounts on them. "You come across very curious things. Emails that are used to register on fishing websites or even adult contact websites, " says the expert.

"In the world of cybersecurity This is known as Open Source Intelligence. OSINT. Use all sources on the internet to locate all pieces of information about employees in an organization. To have a map of who works there and who is the most vulnerable piece, " continues Alonso.

Thanks to the joint effort of OSINT's work —open source intelligence— and taking advantage of what are known as OAuth tokens, cybercriminals can wreak havoc... no need to have stolen your password.

If you have ever signed up for a service using your Gmail or Facebook account, you have validated OAuth tokens. If you've ever logged into a platform with an account on any other social network, too.

An obvious example may be to sign up for Spotify using your Facebook account. When you start the record on the music service, Facebook will launch a tab that will tell you that Spotify "will have access to your account" with a series of permissions, such as accessing your contacts —so you can see what your friends are listening to, to your profile picture —to have the same avatar on the platform—, your name or your personal data —to assign a nick and know when it is your birthday or e—mail.

This is what is known as the OAuth token. The problem is that cybercriminals are able to create fake and malicious apps with OAuth tokens that request a series of disproportionate permissions.

According to Alonso, the employee of Company ' A 'who went on vacation and was impersonated to fraudulently receive a payment from Company' B ' had his password invaded by a fake application. The user in question had granted unconsciously permissions using an OAuth token that gave cyberattackers permission to read their mail and even send emails.

One of the most common phenomena for cyber attacks suffered by companies is ransomware: a group of cybercriminals inoculates in the corporate networks of their victims a malicious program capable of spreading through all the devices on the network and encrypting all the files and assets of the company.

In order for the victim to regain access to their data, they will be forced to pay a ransom in exchange for receiving the antidote.

These ransomware cyberattacks have been a constant for years; and in fact recently it has been suffered by companies such as Mapfre or the Spanish railway manager, Adif, which even suffered a data gap. Some of these criminal collectives are extorting their victims: if they do not pay, they will filter out all the data that, in addition to encrypting, they have stolen.

But this phenomenon, being habitual, is an old acquaintance. Alonso, in his presentation, detailed some examples of cyber attacks on companies.

Here comes into factor artificial intelligence. A booming technology. In August 2019, a unique cyberattack was revealed in which criminals had succeeded in impersonating the CEO of a company with an AI development that was able to mimic his voice. Thus, they ordered fraudulent transfers, according to The Wall Street Journal.

In the same terms, more scams could be seen even in videoconferencing. Chema Alonso taught during the webinar a demonstration of an internal development capable of supplanting through AI a companion of his by himself.

For this reason, the well-known Spanish hacker recalled in his speech that "common sense" is not enough. "One click and goodbye," he summed up.

"Keep in mind that security is not something you buy and ready. It is something that needs to be constantly worked on, that needs to be constantly invested in, and that will never reach 100% security."

You can watch Chema Alonso's full appearance in this video.

You may also find interesting: