Hackers can now steal your voice and access your bank account

8:02 PM
Hackers can now steal your voice and access your bank account -

We have always loved the saying: "Let your voice be heard" Whether it. singing and dramatic high notes, or talking to someone, we always want our voices to be heard.

But if hackers can now steal our voice to draw our identity and access our bank accounts or use it for identity theft?

you heard my right to speak. or rather, you read that right. the researchers found that hackers could steal your voice and use it to fool the voice authentication systems.

Cyber ​​criminals are constantly seeking new opportunities to access personal data anyone. And now they have found a better way to do it. By just speaking in public (especially loud), or post your videos online, you can already provide everything they need to use your identity and claim to like you.

Now still not afraid to let your voice be heard?

The researchers found that the user authentication systems based on voice votes are vulnerable to spoofing attacks. Hackers could be looking for any way to steal your voice and use it for the flight online.

The discoveries made by the University of Alabama at Birmingham, USA to penetrate include automated verification systems of the human voice by capturing the floor and using an off-the-shelf, simple, voice-morphing. The study highlights how it could be used to access bank accounts, identity theft or even to harm someone's reputation. He also discovered how vulnerable we are to leave our information without knowing us.

The director of the UAB cited example situations where our voices could be traced pirated and in all public places, including restaurants and parks; Also, activities such as phone calls and sending videos are no exception.

"People often leave traces of their voices in many different scenarios. They can speak aloud while socializing in restaurants, giving public presentations or make phone calls, or leave voice samples online. "

The pirates could fool a human or automated system by playing a few minutes of voice samples captured by them through their large listening or listening to your public conversations with a device registration, make cold calls, or analysis videos, you may have posted on Youtube or all social media websites.

Even some governments that make use of voice authentication to access their buildings may experience a threat to national security if their path can be deceived by the technology of voice morphing.

voice-impersonation-attack-illustration-1000px

This is how a vocal impersonation attack is done (photo courtesy of UAB)

Sources: ibtimes.uk UAB News

Previous
Next Post »
0 Komentar