Voice Based Software Exploitation

The use of voice recognition is becoming prominence and on the rise for many software. Yet, there are vulnerabilities and shortcomings of algorithms and technologies, that allow attackers to performs voice morphing, or theft of voice histories, etc., to perform other destructive attacks and influences on companies, individuals, politics, legals and more, the possibilities are limitless. This talk identifies those vulnerabilities, risks and preventions.