Most voice encryption systems can be tapped in minutes by installing a voice-recording Trojan on the target computer, a security researcher has confirmed after testing a range of well-known products.
Although this type of attack has been known about for some time, the scale of the issue uncovered by researcher

The link for this article located at Tech World is no longer available.