In today’s digital choir, your voice is the new solo. It’s not just for singing in the shower or whispering sweet nothings anymore. No, it’s now your unique password, your own voice barcode. However, just as we sing about the idea of voice authentication, hackers hit a high note, mastering the art of imitating it.
CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK TIPS, TECHNICAL ADVICE AND EASY FEEDBACK TO MAKE YOU SMARTER
The science behind voice authentication
When registering for voice authentication, you are asked to repeat a specific phrase in your own voice. Think of it as your voice passport. You repeat a phrase and the system extracts a unique “voiceprint” from it and stores it. The next time you try to access it, you repeat a different phrase and the system compares it to your stored voiceprint. If it’s a game, you’re in.
ARE YOU READY FOR AI VOICE CLONING ON YOUR PHONE?
Voice authentication is another option to protect yourself against cyberattacks ( )
How hackers use deepfake software to create fake voices
As voiceprints became more prevalent, hackers realized they could leverage machine learning-enabled deepfake software to generate convincing copies of a victim’s voice using minimal audio recording. What is a deepfake, you ask? It’s essentially a digital doppelganger, an artificial intelligence that can mimic voices or faces with uncanny accuracy.
In the case of audio deepfakes, the software studies the nuances, pitch, inflections and rhythm of a voice sample. Then it generates a voice eerily similar to the original. Yes, we’re talking ventriloquist dummies brought to life here, reproducing voices in a way that can fool not only human ears, but the latest voice authentication systems as well.
In response to these voice impostors, the developers have scratched a counter-beat: they’ve devised “spoofing countermeasures” to distinguish genuine voices from mimics, human from machine-made.
Voice authentication systems vulnerable to deepfake audio attacks
However, researchers at the University of Waterloo have found a way around these countermeasures. They figured out how to make deepfake audio sound so real that it can fool most voice authentication systems.
In a recent test against Amazon Connect’s voice authentication system, they managed a 10% pass rate in four seconds, rising to over 40% in less than 30 seconds. For less advanced systems, they achieved an impressive 99% success rate after just six attempts.
MOVE SIRI – APPLE’S NEW AI VOICE AUDIOBOOK SOUNDS LIKE A HUMAN

Protect yourself and your data from hackers ( )
How to stop cyber crooks from stealing your voice identity
However, all is not lost in this symphony of cyber shenanigans. There are ways to make sure your vocal solo isn’t stolen and used in a hacker’s remix. Let’s dive deeper into these security measures, your own vocal cybersecurity warm-up:
Pay attention to voice replay or voice cloning: One of the ways fraudsters can commit voice authentication fraud is through a voice replay attack or voice cloning, where they record a person’s voice during a phone conversation and then use it to authenticate as that person on a subsequent call.
Be careful when sharing personal information: It is important to be careful when sharing personal information, including your voice, and only share it with trusted sources. If you sign up for voice authentication, make sure you do so with a reputable company or organization.
Be careful when answering phone calls from unknown numbers or people: Be careful when answering phone calls from unknown numbers or people as they may record the call. Also, beware of unsolicited requests for personal information or verification codes, as these can be signs of a scam.
Enable two-factor authentication whenever possible: Two-factor authentication adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password.
Beware of this new bitcoin blackmail scam
Strengthen your passwords: Create strong passwords for your accounts and devices and avoid using the same password for multiple online accounts. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. Check out the best expert-reviewed password managers of 2023 at Cyberguy.com/Passwords
Keep your software up to date: Regularly update your operating system, anti-virus software, web browsers and other applications to ensure that you have the latest security patches and protections.
Use secure networks: Your digital security is only as strong as your weakest link, and often that’s the network you use. Be sure to use secure and reliable networks when using voice authentication. Your home Wi-Fi is your personal recording studio. At the same time, public networks are the equivalent of chanting your password on a crowded street. If you wouldn’t share your bank account details in a cafe, don’t share your voiceprint there.
Disable voice assistant when not in use: When you’re not using your voice assistant, turn it off or on. It’s like putting your mic away after a gig: you wouldn’t leave it on for someone else to use, would you? If not needed, turn it off. You’ll save on battery life and keep snoopers at bay.
Invest in identity theft protection services:Identity theft protection companies monitor your personal information, such as your title deed, social security number (SSN), phone number, and email address for sale on the dark web or for open accounts. They can also help you freeze your bank and credit card accounts. Some providers even offer identity theft insurance and a fraud resolution team to help with recovery. Visit Cyberguy.com/IdentityTheft for my identity theft protection tips and recommendations.
DON’T LET NEARBY SNOOPS LISTEN TO YOUR VOICEMAIL WITH THIS QUICK TIP

Hackers can now use your voice to access your data ( )
Kurt’s main takeaways
In the great orchestra of technology, each of us has a role to play in ensuring our own digital security. Voice authentication, despite its potential vulnerabilities, remains a significant advancement in personal security technology. It’s a leap from the monotonous buzz of passwords to the vibrant symphony of unique voiceprints. However, as researchers at the University of Waterloo remind us, no system is foolproof. We must remain vigilant, practice good cybersecurity hygiene, and stay up to date with the latest technology trends.
CLICK HERE TO GET THE FOX NEWS APP
Now that you know your voice can be your password, are you ready to sing the chorus of voice authentication, or would you rather stick to the old-school rhythm of typing in passwords? Let us know by writing to us at Cyberguy.com/Contact
For more of my security alerts, subscribe to my free CyberGuy Report newsletter by going to Cyberguy.com/Newsletter
Copyright 2023 CyberGuy.com. All rights reserved.