“In order for an attack to be successful, the user would have to have a microphone and speakers connected to their system.”