Security Vulnerabilities of Voice Recognition Technologies

by Daniel Dimov
Oct. 8, 2017 0 comments INFOSEC Institute Encryption & Authentication

An increasing number of devices nowadays use voice recognition technologies for performing commands, allowing access to stored information, and transcribing audio to a written text. For example, voice recognition technologies are implemented in automated phone systems, car entertainment systems, and the operational systems “Windows” and “iOS”. However, since voice recognition technologies are in their infancy, it may have a large number of security vulnerabilities that can be used by hackers to gain unauthorized access to sensitive information. One of the major weakness of devices relying on voice authentication is that voice information can accessed more easily than other biometric information, such as fingerprints. For example, while one needs to be in a physical proximity to objects touched by a person in order to receive information about that person’s fingerprints, this may not be necessary for obtaining access to voice information. Nowadays, many people make their voice freel...