Spotting AI-generated scams: Red flags to watch for - Help Net Security

If lighting looks off, with harsh contrasts or mismatched shadows, it could be a sign of manipulation), blurriness (Edges, where the face is swapped, may appear blurred, distorted, or pixelated, especially if the transition between the fake and real parts is not smooth), audio anomalies (If the voice sounds robotic, lacks emotion, or doesn’t match the speaking style of the person being imitated, it could be a fake). In this Help Net Security interview, Andrius Popovas, Chief Risk Officer at Mano Bank, discusses the most prevalent AI-driven fraud schemes, such as phishing attacks and deepfakes. Therefore, if you receive a video or audio call, you need to pay attention to these red flags: strange facial movements (Look for unnatural expressions, mismatched lip movements, or awkward eye movement), inconsistent lighting (Natural videos typically have consistent lighting across a scene. From our practice, the most common are phishing attacks, when AI generates very realistic phishing emails or other messages (SMS, Viber, WhatsApp, etc.) that mimic actual companies, tricking users into revealing sensitive information like passwords or credit card numbers. AI manipulation of videos and audio, commonly known as deepfakes, utilizes machine learning algorithms to create realistic but altered content. These are AI-generated videos or audio recordings that can impersonate real people and successfully access sensitive or personal information. Popovas also outlines strategies for professionals to stay ahead of these scams and the role of governments in combating AI fraud. AI can also assist fraudsters in guessing or cracking account passwords, allowing them to take control of user accounts for Loan and Credit Application Fraud. Governments and international organizations play a crucial role in combating AI fraud through several key functions: regulation, policy formulation, enforcement, and international cooperation. Ensure all staff members are trained to recognize phishing attempts, deepfakes, and other AI-driven scams.

This Cyber News was published on www.helpnetsecurity.com. Publication date: Thu, 03 Oct 2024 05:13:09 +0000


Cyber News related to Spotting AI-generated scams: Red flags to watch for - Help Net Security

CVE-2024-26633 - In the Linux kernel, the following vulnerability has been resolved: ...
11 months ago
CVE-2025-21707 - In the Linux kernel, the following vulnerability has been resolved: ...
1 week ago
CVE-2024-36886 - In the Linux kernel, the following vulnerability has been resolved: ...
8 months ago
CVE-2024-26857 - In the Linux kernel, the following vulnerability has been resolved: ...
10 months ago
CVE-2024-47685 - In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() syzbot reported that nf_reject_ip6_tcphdr_put() was possibly sending garbage on the four reserved tcp bits (th->res1) Use ...
4 months ago Tenable.com
CVE-2024-35893 - In the Linux kernel, the following vulnerability has been resolved: ...
8 months ago
CVE-2024-42106 - In the Linux kernel, the following vulnerability has been resolved: ...
2 months ago
CVE-2024-58071 - In the Linux kernel, the following vulnerability has been resolved: ...
5 days ago
Business Email Compromise Scams: Prevention and Response - We will also highlight red flags to watch out for in suspicious emails, emphasizing the importance of implementing robust email authentication methods and comprehensive employee training programs to enhance awareness and response capabilities. BEC ...
1 year ago Securityzap.com
Unravelling Retirement Banking Scams and How To Protect Yourself - In the labyrinth of financial scams, one of the most insidious is the retirement banking scam. According to the FBI, in 2020 alone, financial scams targeting seniors netted more than $1 billion. It's a quiet crisis that we need to address, and ...
1 year ago Hackread.com
CVE-2024-50083 - In the Linux kernel, the following vulnerability has been resolved: tcp: fix mptcp DSS corruption due to large pmtu xmit Syzkaller was able to trigger a DSS corruption: TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending ...
4 months ago Tenable.com
CVE-2024-26781 - In the Linux kernel, the following vulnerability has been resolved: mptcp: fix possible deadlock in subflow diag Syzbot and Eric reported a lockdep splat in the subflow diag: WARNING: possible circular locking dependency detected ...
11 months ago Tenable.com
CVE-2023-52784 - In the Linux kernel, the following vulnerability has been resolved: bonding: stop the device in bond_setup_by_slave() Commit 9eed321cde22 ("net: lapbether: only support ethernet devices") has been able to keep syzbot away from net/lapb, until today. ...
9 months ago Tenable.com
CVE-2024-50035 - In the Linux kernel, the following vulnerability has been resolved: ppp: fix ppp_async_encode() illegal access syzbot reported an issue in ppp_async_encode() [1] In this case, pppoe_sendmsg() is called with a zero size. Then ppp_async_encode() is ...
4 months ago Tenable.com
CVE-2025-21716 - In the Linux kernel, the following vulnerability has been resolved: ...
1 week ago
CVE-2024-50033 - In the Linux kernel, the following vulnerability has been resolved: slip: make slhc_remember() more robust against malicious packets syzbot found that slhc_remember() was missing checks against malicious packets [1]. slhc_remember() only checked the ...
4 months ago Tenable.com
CVE-2024-56648 - In the Linux kernel, the following vulnerability has been resolved: net: hsr: avoid potential out-of-bound access in fill_frame_info() syzbot is able to feed a packet with 14 bytes, pretending it is a vlan one. Since fill_frame_info() is relying on ...
2 months ago Tenable.com
CVE-2024-44999 - In the Linux kernel, the following vulnerability has been resolved: ...
2 months ago
CVE-2024-57802 - In the Linux kernel, the following vulnerability has been resolved: netrom: check buffer length before accessing it Syzkaller reports an uninit value read from ax25cmp when sending raw message through ieee802154 implementation. ...
1 month ago Tenable.com
CVE-2022-48956 - In the Linux kernel, the following vulnerability has been resolved: ipv6: avoid use-after-free in ip6_fragment() Blamed commit claimed rcu_read_lock() was held by ip6_fragment() callers. It seems to not be always true, at least for UDP stack. syzbot ...
4 months ago Tenable.com
How Criminals Are Leveraging AI to Create Convincing Scams - Cybercriminals create far more sophisticated scams with generative AI than traditional phishing scams. According to Visa research, scammers are fooling even the savviest internet users by launching pig butchering, inheritance, humanitarian relief ...
9 months ago Tripwire.com
Week in review: PoC for Splunk Enterprise RCE flaw released, scope of Okta breach widens - Vulnerability disclosure: Legal risks and ethical considerations for researchersIn this Help Net Security interview, Eddie Zhang, Principal Consultant at Project Black, explores the complex and often controversial world of vulnerability disclosure in ...
1 year ago Helpnetsecurity.com
CVE-2024-26863 - In the Linux kernel, the following vulnerability has been resolved: ...
10 months ago
CVE-2024-26641 - In the Linux kernel, the following vulnerability has been resolved: ...
11 months ago
CVE-2024-26882 - In the Linux kernel, the following vulnerability has been resolved: ...
10 months ago

Latest Cyber News


Cyber Trends (last 7 days)