1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Voice hackers can record your voice then use morpher to trick authentication systems

Discussion in 'Network World' started by RSS, Sep 30, 2015.

  1. RSS

    RSS New Member Member

    It’s easy for someone with potentially malicious intentions to record your voice as you leave traces of your voice when simply talking somewhere out in public, during mobile phone calls, in videos posted on social networking sites, or even when sending a recorded voice greeting card. Your voice is considered to be unique enough to serve as an authentication of you. But after studying the implications of commonplace voice leakage, and developing voice impersonation attacks, researchers from the University of Alabama at Birmingham warned that an attacker, in possession of only a very limited number of your voice samples – with “just a few minutes worth of audio of a victim’s voice,” can clone your voice and could compromise your security, safety and privacy.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page