HT TECH wants to start sending you push notifications. Click allow to subscribe

AI voice cloning scams: 2 ways to safeguard your conversations and protect finances

Criminals are using AI to clone voices, tricking people into handing over money. Know two crucial tactics to protect yourself and your loved ones from AI voice-cloning scams.

By: MD IJAJ KHAN
Updated on: Apr 19 2024, 19:16 IST
Know how to spot and foil AI voice-cloning scams with two simple conversational tactics. (McAfee)

Artificial intelligence, while promising, is now being exploited by criminals to deceive unsuspecting phone users. With AI, voices can be cloned rapidly, leading to convincing replicas used to swindle money or sensitive information from friends and family.

Understand the Threat

According to Jasdev Dhaliwal from McAfee, voice cloning, also known as voice synthesis or mimicry, allows individuals to replicate voices with astonishing accuracy. Originally developed for benign purposes like voice assistants, it has unfortunately become a tool for malicious actors seeking to exploit victims, The Sun reported

You may be interested in

Mobiles Tablets Laptops
7% OFF
Apple iPhone 15 Pro Max
  • Black Titanium
  • 8 GB RAM
  • 256 GB Storage
₹148,900₹159,900
Buy now
4% OFF
Samsung Galaxy S24 Ultra
  • Titanium Black
  • 12 GB RAM
  • 256 GB Storage
₹129,999₹134,999
Buy now
10% OFF
Apple iPhone 15 Plus
  • Black
  • 6 GB RAM
  • 128 GB Storage
₹80,990₹89,900
Buy now
13% OFF
Xiaomi 14
  • Matte Black
  • 12 GB RAM
  • 512 GB Storage
₹69,999₹79,999
Buy now
Acer Swift Go SFG14 41 NX KG3SI 002 Laptop
  • Pure Silver
  • 8 GB RAM
  • 512 GB SSD
₹54,990
Check details
Acer Aspire 5 A515 57G Laptop Core I5 12th Gen 16 GB 512 GB SSD Windows 11 UN K9TSI 002
  • Gray
  • 16 GB RAM
  • 512 GB SSD
₹54,990
Check details
Asus VivoBook 15 X515JA BQ322WS Laptop
  • Transparent Silver
  • 8 GB RAM
  • 512 GB SSD
₹32,990
Check details
Acer Aspire 3 A315 24 NX KDESI 004 Laptop
  • Silver
  • 8 GB RAM
  • 512 GB SSD
₹32,790
Check details
35% OFF
Xiaomi Pad 6
  • Mist Blue
  • 6 GB RAM
  • 128 GB Storage
₹25,999₹39,999
Buy now
53% OFF
Lenovo Tab M10 5G
  • Abyss Blue
  • 6 GB RAM
  • 128 GB Storage
₹21,999₹47,000
Buy now
36% OFF
Realme Pad 2
  • Imagination Grey
  • 6 GB RAM
  • 128 GB Storage
₹18,699₹28,999
Buy now
Honor Pad X9
  • Gray
  • 4 GB RAM
  • 128 GB Storage
₹14,999
Check details

Also read: Apple HomePod set for a big design change? Prototype with touchscreen LCD display surfaces

Also read: Looking for a smartphone? To check mobile finder click here.

Deploy Countermeasures

Identifying cloned voices is challenging, but there are two strategies to mitigate risks. Firstly, establishing a safe word with loved ones can serve as a quick authenticity check during unexpected calls requesting money or sensitive data. By using the safe word, individuals can reveal potential scams, as fraudsters are unlikely to know it.

Verify Authenticity

Secondly, asking personal questions can further confirm a caller's identity. By posing queries about shared memories or past experiences, individuals can verify authenticity. If suspicions persist, contacting the person through an alternative method is advised.

Also read: CERT-In warns of critical Microsoft Defender for IoT vulnerabilities

Take Precautionary Measures

In addition to these precautions, caution is warranted when asked to send money through unconventional means. Statistics reveal the prevalence and impact of phone scams, with millions of Americans falling victim and losing significant amounts of money.

Stay Vigilant

To combat these scams, individuals are advised never to disclose personal or financial information over the phone. Enrolling in the Do Not Call Registry and utilising spam call-filtering apps can reduce exposure to fraudulent calls. Furthermore, exercising discretion when sharing phone numbers and scrutinising requests for unconventional money transfers are crucial steps to safeguard against scams.

Also read: Earth Day 2024: Google Maps and Search bring easy ways to find EV charging stations

Report Suspicious Activity

Any suspicious activity, especially sudden requests for money using unfamiliar methods, should be reported to authorities to prevent further exploitation by criminals.

By adopting these conversational tactics and remaining vigilant, individuals can protect themselves and their loved ones from falling victim to AI voice-cloning scams.

Catch all the Latest Tech News, Mobile News, Laptop News, Gaming news, Wearables News , How To News, also keep up with us on ,Twitter, Facebook, , and Instagram. For our latest videos, subscribe to our YouTube channel.

First Published Date: 19 Apr, 19:16 IST
NEXT ARTICLE BEGINS