Hacking your voice to perform social engineering attack

  • 0
hacking your voice

Hacking your voice to perform social engineering attack

Category : Blog

hacking your voice

Hacking your voice to perform social engineering attack

Hacking you voice is real and possible as Hackers can use photoshopping voiceover . An engineer’s dream is “project voco” where the software allows the controller to edit and insert words into an audio recording without bringing back the original vocalist back to the studio. Hacking your voice and fooling the other person to perform the social engineering attack can be done by just recording the 20-min speech of the person. Now the attacker can change, edit text and do whatever he wants.


Watch out the video of the demo presentation of ADOBE “project voco”


Clearly, lots of people are excited about the prospect of being able to alter audio recordings. But not everyone is jumping on the bandwagon. Dr. Eddy Borges Rey, a lecturer in media and technology at the University of Stirling, is concerned by the development. He revealed as much to BBC News.

An attacker can record the CEOs voice and can use this software the fool the accounts head and can perform fraud at its will.

It’s unclear when Photoshopping Voiceovers will become publicly available. When it does, it’ll take even more time to determine how easy it is for people to identify an audio recording that someone’s modified using the technology. With that in mind, organizations’ best hope of preventing attacks such as those described above is to train their employees to be on the lookout for vishing and spear-phishing attacks. If an attacker can’t build a pretext, they won’t be able to leverage VoCo to make fraudulent wire transfers or steal sensitive information.


Most Demanded Courses at Indian Cyber Security Solutions


Ethical Hacking Training – Get a Certified Ethical Hacking Professional Certificate from us which is valid in all over India and all MNCs recognises it.


C | EH – Certified Ethical Hacker certification from EC-Council. This certificate is highly demanded by all organizations across the globe. This certificate is globally recognized and more than 160 countries recognises it.


Android Penetration Testing – Best way to secure your own application. This is the future, where you need to teste the real world android applications and find out vulnerabilities for the organization

Leave a Reply

Show Buttons
Hide Buttons