January 3, 2018 By Shane Schick 2 min read

Voice recognition authentication may be a lot quicker and easier than logging on to IT systems using more traditional passwords, but researchers are suggesting the technology could be easily bypassed through basic trickery.

As noted by TechRepublic, users are increasingly speaking, rather than typing, their credentials to gain access to applications on a network. Through a combination of behaviorial and physiological biometrics, voice recognition is already available in cloud-based products such as Microsoft Azure and the iPhone X. However, imitating a particular person’s tone may be all it takes for cybercriminals to break in.

Compromising Voice Recognition Authentication

Last spring, BBC reported a story in which a reporter had his fraternal twin brother break into his bank account with HSBC using voice recognition authentication. Although the financial services firm deployed the technology in 2016 and used dozens of different variables to identify unique vocal patterns, mimicking the user’s voice allowed his brother to see account histories and make transfers. HSBC has since said it will look further into how it secures online services.

Although biometrics may have once seemed like an unusual security tool, a recent study from Visa revealed that consumers are increasingly in favor of login options that don’t involve a token or password. TechTarget predicted that technologies like voice recognition authentication will ultimately emerge as the preferred security method based on their simplicity. However, it’s this same ease of use that makes these features vulnerable to cybercriminals.

Enhancing Biometric Security

Opus Research suggested that there are some measures that could make voice recognition authentication more difficult to compromise. This includes systems that would play back vocal commands more carefully to detect impostors, as well as technologies that ensure what’s being heard by a system is a live person rather than a recording.

The more immediate solution is to approach biometrics in a multimodal fashion. Much like two-factor authentication that includes a token and a password, it could benefit users to pair their voice with a second credential. As advanced as the technology is becoming, computers still need to ensure we are who are say we are.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today