Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a DEF CON conference presentation that delves into the security vulnerabilities of voice verification systems through advanced voice cloning technology. Learn how deep learning enables the creation of highly convincing voice replicas, demonstrated through a practical case study where cloned voices successfully circumvent major institutional security measures. Gain detailed insights into voice cloning tools and techniques, understand the associated cybersecurity risks, and discover strategic countermeasures for red team operations. Master the methodology of leveraging publicly available voice samples for simulating voice-based attacks, while developing a comprehensive understanding of AI-driven threats and their implications for defensive strategy development.