Tag Archive for: Voice

Army Chief Emphasises Importance of Media to Military Operations – Voice of Nigeria






















Army Chief Emphasises Importance of Media to Military Operations – Voice of Nigeria

















Source…

Kyndryl Introduces Experience Management as a Service to Help Customers Monitor, Measure and Achieve Business Outcomes IT Voice








Kyndryl Introduces Experience Management as a Service to Help Customers Monitor, Measure and Achieve Business Outcomes IT Voice | IT in Depth

















































Go toTop









Source…

Are Voice Authentication Security Systems Effective? Deepfake Attack Poses Alarming Threat


Computer scientists from the University of Waterloo have made a concerning discovery regarding the effectiveness of voice authentication security systems. 

They have identified a method of attack that can successfully bypass these systems with an alarming success rate of up to 99% after only six attempts.

COLOMBIA-AVIATION-BIOMETRIC-MIGRATION-SYSTEM-EL DORADO-FEATURE

(Photo : JUAN BARRETO/AFP via Getty Images)
Passengers use BIOMIG, the new biometric migration system, at El Dorado International Airport in Bogota on June 2, 2023. Colombian Migration launched a new biometric migration system for foreigners.

Deepfake Voiceprints

Voice authentication has become increasingly popular in various security-critical scenarios, such as remote banking and call centers, where it allows companies to verify the identity of their clients based on their unique “voiceprint.”

During the enrollment process of voice authentication, individuals are required to replicate a designated phrase, which is then used to extract and store a distinct vocal signature or voiceprint on a server. 

In subsequent authentication attempts, a different phrase is utilized, and the extracted characteristics are compared against the stored voiceprint to ascertain access.

However, the researchers at the University of Waterloo have found that voiceprints can be manipulated using machine learning-enabled “deepfake” software, which can generate highly convincing copies of someone’s voice using just a few minutes of recorded audio. 

Hence, developers introduced “spoofing countermeasures” to differentiate between human-generated speech and machine-generated speech.

The research team have created a method that bypasses these spoofing countermeasures, enabling them to deceive most voice authentication systems within only six attempts. 

They have identified the markers in deepfake audio that expose its computer-generated nature and have created a program to take out these markers, rendering the fake audio indistinguishable from real recordings.

During a evaluation conducted on Amazon Connect’s voice authentication system, the researchers accomplished a 10% success rate within a brief four-second attack, which escalated to over 40% in under thirty…

Source…

How to combat voice security issues in collaboration platforms


Internet-based telephony lets employees communicate with anyone at anytime, anywhere. While these modern voice services make workplaces more efficient and flexible, they also open a potential minefield of voice security issues. In this tip, we’ll explore several potential voice threats generated by modern enterprise collaboration platforms and discuss methods to address them.

Voice security challenges in modern collaboration platforms

Ironically, many of today’s voice threats stem from the technologies that make enterprise collaboration voice accessible from everywhere. While these collaboration systems are no doubt convenient, they create risks that were not plausible on traditional closed systems:

1. Compromised BYOD. Desktop and smartphone apps are now the de facto method of making and receiving internal and external business calls. In many cases, employees and contractors can use their personal laptops, phones and tablets to connect to business collaboration platforms. What keeps many cybersecurity professionals up at night is the potential that a hacker could access the corporate network through a voice collaboration app loaded on an unsecure personal device. Because organizations don’t own these devices, they can’t adequately manage BYOD OS and application updates.

2. SaaS platform compromises. SaaS voice applications can hamstring the ability of companies to oversee call manager platforms. Having a third party handle the responsibility of building, maintaining and securing voice and collaboration services is both a blessing and a curse. On one hand, outsourcing these operations frees up the organization from managing servers, network operating systems and voice/collaboration services. On the other, it requires companies to place a tremendous trust in that service provider to properly manage and secure the service.

Additionally, large collaboration providers are a much bigger and potentially more lucrative target for bad actors. Thus, these providers are likely to be threatened with zero day vulnerabilities, DDoS attacks, malware and social engineering attempts. And because these companies serve a multitude of customers, a successful attack on a single provider has the…

Source…