{"id":943,"date":"2024-01-15T10:17:16","date_gmt":"2024-01-15T10:17:16","guid":{"rendered":"https:\/\/e5hforensics.com\/?p=943"},"modified":"2024-02-26T13:08:30","modified_gmt":"2024-02-26T13:08:30","slug":"the-ominous-rise-of-the-ai-voice-scam","status":"publish","type":"post","link":"https:\/\/e5hforensics.com\/index.php\/2024\/01\/15\/the-ominous-rise-of-the-ai-voice-scam\/","title":{"rendered":"The Ominous Rise of the AI Voice Scam"},"content":{"rendered":"\n<p>A few months ago, and without much fanfare, Apple released a rather important new feature on its digital devices. Called \u2018Personal Voice\u2019, this software tool asks users to record themselves speaking a variety of sentences. The AI then analyzes the user\u2019s voice, encoding the sounds into an algorithm. After setup is complete, users can type whatever they want into their device \u2014 and then listen as the device reads the text back to them in the user\u2019s own voice.<\/p>\n\n\n\n<p>But every tool can also be used in ways it wasn\u2019t designed for. As voice cloning software is added to the cybercriminal\u2019s toolbox, new types of scams have begun to surface. A familiar voice that can bring joy, can also be made to cause panic \u2014 and separate people from their money. \u201cMom, I\u2019ve been arrested,\u201d one such scam goes. \u201cI\u2019ll explain the details later, but for now I just need you to wire some money to help get me out of jail. Use this link \u2026\u201d<\/p>\n\n\n\n<p>Another version: \u201cDad, I\u2019ve been kidnapped! I\u2019m so scared. They\u2019re gonna kill me if you don\u2019t pay them. Send $10,000 to this bank account \u2014 and please hurry!\u201d<\/p>\n\n\n\n<p>Voice cloning technology is already of good enough quality to fool most people, particularly if they are unprepared for this type of scam.\u00a0 <\/p>\n\n\n\n<p>How, then, can people defend themselves against such tactics? Here are some ways:<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-bangkok-bank-innohub wp-block-embed-bangkok-bank-innohub\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"gPVUTqNGP7\"><a href=\"https:\/\/www.bangkokbankinnohub.com\/the-ominous-rise-of-the-ai-voice-scam\/\">The Ominous Rise of the AI Voice Scam<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;The Ominous Rise of the AI Voice Scam&#8221; &#8212; Bangkok Bank Innohub\" src=\"https:\/\/www.bangkokbankinnohub.com\/the-ominous-rise-of-the-ai-voice-scam\/embed\/#?secret=uJwOIWsL63#?secret=gPVUTqNGP7\" data-secret=\"gPVUTqNGP7\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>A few months ago, and without much fanfare, Apple released a rather important new feature on its digital devices. Called \u2018Personal Voice\u2019, this software tool asks users to record themselves speaking a variety of sentences. The AI then analyzes the user\u2019s voice, encoding the sounds into an algorithm. After setup is complete, users can type whatever they want into their device \u2014 and then listen as the device reads the text back to them in the user\u2019s own voice. But every tool can also be used in ways it wasn\u2019t designed for. As voice cloning software is added to the<\/p>\n","protected":false},"author":2,"featured_media":945,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[25],"tags":[],"class_list":["post-943","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-scams"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/posts\/943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/comments?post=943"}],"version-history":[{"count":2,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/posts\/943\/revisions"}],"predecessor-version":[{"id":949,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/posts\/943\/revisions\/949"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/media\/945"}],"wp:attachment":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/media?parent=943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/categories?post=943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/tags?post=943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}