It’s bad enough that people fill in those data harvesting posts that seem to wander around endlessly on social media (go on, admit it…you’ve filled one in yourself at some point). Given that twitter now allows ‘Voice Notes’, it’s going too be easier than ever to harvest victims’ voices and use them in spoofing attacks…:
[…] CSIRO’s Data61 cybersecurity research scientist Muhammad Ejaz Ahmed explained how spoofing attacks are becoming increasingly common as voice technologies are being used to shop online, make phone calls, send messages, control smart home appliances, and access banking services.
“Although voice spoofing is known as one of the easiest attacks to perform as it simply involves a recording of the victim’s voice, it is incredibly difficult to detect because the recorded voice has similar characteristics to the victim’s live voice,” he said.
“Void is game-changing technology that allows for more efficient and accurate detection helping to prevent people’s voice commands from being misused.”