Is voice biometrics in banking secure enough?

SMART Access & Identity 2024 Access Control & Identity Management, AI & Data Analytics

Apart from going into a branch, calling a bank feels more human for digital-shy consumers. For many, it is the first port of call for making account changes or moving large sums of money, but how safe is voice banking really, and what are the chances of someone using generative AI to fake a consumer’s voice and steal their available funds?

As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.


Gur Geva.

Impersonation attacks continue to increase

Impersonation is one of the predominant methods fraudsters use to rob consumers. Using identifying information such as personal details or AI-generated voice, criminals can access consumer bank accounts with impunity. According to the Southern African Fraud Prevention Service (SAFPS), impersonation attacks increased by 264% for the first five months of 2022 compared to 2021.

Gur Geva, founder of iiDENTIFii, explains why. “The technology required to impersonate an individual has become cheaper, easier to use and more accessible. This means that it is simpler than ever before for a criminal to assume one aspect of a person’s identity.”

How voice impersonation works

Voice recognition systems in banking rely on a person saying something aloud, such as a unique catchphrase or password. This is vulnerable to exploitation because synthetic AI-generated voice technology has evolved to such an extent that it is indistinguishable from real voices. According to MIT and Google, generative AI voice cloning tools only need a minute of voice data, often scraped from social media, to create a result almost indistinguishable from the original.

The potential of this technology is vast. Microsoft, for example, has recently piloted an AI tool that, with a short sample of a person’s voice, can generate audio in various languages. While this has not been released for public use, it illustrates how much voice as a medium can be manipulated.

The appeal of voice recognition in banking

Voice recognition has a multitude of benefits. It is accessible to a diverse range of consumers, who only need a phone line to perform banking tasks. Voice recognition programs can often pick up a voiceprint much faster than a person can type, which streamlines and reduces friction in the banking process for consumers without needing to enter complex passwords.

“Historically, voice biometrics has been seen as an intimate and infallible part of a person’s identity. For that reason, many businesses and financial institutions used it as a part of their identity verification toolbox,” says Geva.

Audio recognition technology has been an attractive security solution for financial services companies across the globe, with voice-based accounting enabling customers to deliver account instructions via verbal commands. Voice biometrics offers real-time authentication, which replaces the need for security questions or even PINs.

One of the UK’s biggest banks, for example, integrated Siri to facilitate mobile banking payments without the need to open or log into the banking app. An Abu Dhabi-based bank introduces a biometric voice and voice-based authentication platform for e-commerce, which uses biometric sensors built into a standard smartphone.

“As voice-cloning becomes a viable threat, financial institutions need to be aware of the possibility of widespread fraud in voice-based interfaces. For example, a scammer could clone a consumer’s voice and transact on their behalf,” says Geva.

Do away with voice authentication altogether?

Thankfully, banks do not rely on a single form of authentication when performing a transaction. As the threat of cyber fraud grows, a rising number of local banks are investing in cutting-edge, multi-layered biometric authentication protocols.

Geva adds, “Our experience in mitigating fraud and our research into rising AI-enabled cybercrime trends has led us to believe that voice authentication can be made safer if it is bolstered by additional remote digital verification methods. We recommend that banking clients adopt multi-model identity verification, especially for sensitive transactions.”

In conclusion, voice biometrics in banking still serves several customers, particularly those who may need access to smartphone apps or in-person banking. While fraud risks abound, voice cloning is less of a threat to the public as it is difficult to roll out at scale as criminals would need to have access to substantial personal information for each target. AI voice cloning technology may be cheaper and more accurate, but if banks employ up-to-date, enterprise-grade biometric authentication processes, they will be better protected.

Geva notes, “While identity theft is growing in scale and sophistication, the tools we have at our disposal to prevent fraud are intelligent, scalable and up to the challenge. At iiDENTIFii, we believe that face biometrics remains the strongest form of biometrics, as the face can be matched against a government-issued, trusted ID document, whereas a voice cannot. This approach is trusted by our clients, which include five of South Africa’s leading banks.”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...
DeepAlert appoints Howard Harrison as CEO
DeepAlert News & Events AI & Data Analytics
DeepAlert has appointed Howard Harrison as chief executive officer. DeepAlert’s founder and CEO of the past six years, Dr Jasper Horrell, will transition into a newly created role as chief innovation officer.

Read more...
The year of the agent
Information Security AI & Data Analytics
The dominant attack patterns in Q4 2025 included system-prompt extraction attempts, subtle content-safety bypasses, and exploratory probing. Indirect attacks required fewer attempts than direct injections, making untrusted external sources a primary risk vector heading into 2026.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
The year of machine deception
Security Services & Risk Management AI & Data Analytics
The AU10TIX Global Fraud Report, Signals for 2026, warns of the looming agentic AI and quantum risk, leading to a surge in adaptive, self-learning fraud, and outlines how early warning systems are fighting back.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.