#<p>&#160;</p>
<p><strong><a href="http://www.techeye.net/wp-content/uploads/2015/09/2672889152_0fa1bf6ebc_b-e1443512967843.jpg"><img class=" size-full wp-image-161604 alignleft" src="http://www.techeye.net/wp-content/uploads/2015/09/2672889152_0fa1bf6ebc_b-e1443512967843.jpg" alt="2672889152_0fa1bf6ebc_b" width="330" height="248" /></a>Security experts are</strong> looking into ways attackers can fool voice-based security systems by impersonating a person’s voice.</p>
<p>A team at the University of Alabama, Birmingham (UAB), has found that using readily available voice morphing software, hackers are able to administer voice imitation attacks to breach automated and human authentication systems.… <a href="http://www.techeye.net/news/hackers-steal-your-voice" class="read-more">Read the rest</a></p>

More...