Voice recognition vulnerablities

A good read:
http://resources.infosecinstitute.com/security-vulnerabilities-of-voice-recognition-technologies/

Comments

Popular posts from this blog

SQL Injection in search field

File Upload through Null Byte Injection