Truecaller AI Call Scanner detects AI voice clones in real-time

Illegitimate voice cloning and speech synthesis technologies are improving at an incalculable rate of change and are already commoditized and ubiquitous.
This next wave of AI scams will prey on the most vulnerable side of our psyche: the threat of our loved ones in danger.
Truecaller announced the latest salvo in its arsenal of spam and scam fighting abilities: the AI Call Scanner.
AI Call Scanner is trained to detect and differentiate between human voices and AI-synthesized voices, empowering people to safeguard themselves against potential scams and fraudulent activities.
The AI Call Scanner is built right into the Truecaller Android app, is part of the Premium subscription and is being rolled out in the US first, with plans to launch globally.
The system is designed with simplicity and effectiveness in mind.
If a person receives a suspicious call, all they have to do is tap a dedicated button within the Truecaller interface.
The caller's voice is recorded and this voice sample is then processed by advanced AI model, which has been trained to identify the unique characteristics of human speech and distinguish it from AI-generated voices.
All this happens in just a few seconds and with a high degree of accuracy.
While AI Call Scanner is launching on Android first, Truecaller is exploring avenues for further improvement and expansion, including an imminent iOS launch.
Truecaller's team is actively researching ways to refine the AI model's accuracy, reduce response times, and adapt to emerging trends in voice synthesis technology.
Truecaller is considering the potential integration of AI Call Scanner with other communication platforms and devices to extend its reach and impact; for example, building a chatbot where people can forward recorded clips for detection.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Wed, 29 May 2024 13:13:06 +0000


Cyber News related to Truecaller AI Call Scanner detects AI voice clones in real-time

Truecaller AI Call Scanner detects AI voice clones in real-time - Illegitimate voice cloning and speech synthesis technologies are improving at an incalculable rate of change and are already commoditized and ubiquitous. This next wave of AI scams will prey on the most vulnerable side of our psyche: the threat of ...
1 month ago Helpnetsecurity.com
Adobe Real-Time CDP: Personalized Customer Experience - Adobe Experience Cloud Products like Adobe Real-Time CDP are available to assist. A revolutionary solution called Adobe Real-Time Customer Data Platform was created to assist companies in realizing the whole value of their customer data. Adobe ...
6 months ago Hackread.com
Truecaller Introduces AI Voice Feature for Personalized Call Responses - The Caller ID company Truecaller will now allow users to create an AI version of their voice to answer calls. Truecaller, known for identifying and blocking spam calls, is introducing a new feature for users with access to its AI Assistant. By ...
1 month ago Cysecurity.news
Deep dive into synthetic voice phishing defense - Voice phishing attacks are an escalating threat and this alarming statistic highlights a pervasive lack of awareness among the general population. At the moment, different techniques are being used by both big and small businesses to fight back ...
5 months ago Cybersecurity-insiders.com
Voice Assistants and Privacy: Striking the Right Balance - The pervasive presence of voice assistants in our lives is a testament to the power of technology and its potential for furthering human progress. Voice assistants are digital, voice-controlled devices that allow users to interact with a virtual ...
6 months ago Securityzap.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
6 months ago Esecurityplanet.com
ID R&D introduces voice clone detection to protect users against audio deepfakes - ID R&D introduced voice clone detection as a new option for its IDLive Voice liveness detection product. Detecting voice clones and audio deepfakes can prevent fraud and crime, deter bad actors, and help preserve trust in the authenticity of digital ...
5 months ago Helpnetsecurity.com
Google Chrome To Roll Out Real-Time Phishing Protection - Google Chrome has been protecting users from malicious websites and files with Safe Browsing, which maintains a locally-stored list updated every 30-60 minutes. To address it, Chrome is introducing a new version of Safe Browsing that provides ...
3 months ago Cybersecuritynews.com
CVE-2024-37904 - Minder is an open source Software Supply Chain Security Platform. Minder's Git provider is vulnerable to a denial of service from a maliciously configured GitHub repository. The Git provider clones users repositories using the ...
2 weeks ago
Why Cybersecurity Businesses Need a Real-Time Collaboration Tool - When the Cybercrime in a Pandemic World study was released in late 2021, the report noted that cybersecurity threats had risen 81% since the coronavirus raised its ugly head. It was a time of restrictive lockdowns, stay-at-home orders, and mask ...
1 year ago Hackread.com
Americans Receive Two Billion Spam Calls Per Month - US consumers were deluged with an estimated two billion spam and scam calls last month, according to new data from Truecaller. The Swedish provider of caller ID and call blocking services revealed the data as part of its new Monthly US Spam and Scam ...
7 months ago Infosecurity-magazine.com
An Introduction to Bypassing User Mode EDR Hooks - While cross-referencing notes against old blog posts, I realized that I never actually published the majority of my work on system calls and user mode hooking. System calls are the standard way to transition from user mode to kernel mode. On Windows, ...
6 months ago Malwaretech.com
Is Imitation A Form Of Flattery? Scarlett Johansson Doesn't Think So - It all started when Open AI's CEO Sam Altman unveiled a new ChatGPT version that included a new voice assistant seemingly inspired by the movie Her. Controversy started bubbling over how Scarlett Johansson's AI assistant character influenced ...
1 month ago Blog.avast.com
Daon xSentinel minimizes generative AI voice fraud - Daon announced the addition of xSentinel, an expansion of its AI.X technology. xSentinel provides adaptive synthetic voice protection to create a layer of defense within any voice communication channel and enhance the identity verification ...
6 months ago Helpnetsecurity.com
FTC soliciting contest submissions to help tackle voice cloning technology - The Federal Trade Commission is now accepting submissions for a contest designed to spur development of products and policies to protect consumers from the malicious use of voice cloning technology, which has been fueled by the advance of ...
6 months ago Therecord.media
The dangers of voice fraud: We can't detect what we can't see - Despite these concerns, there's a more subtle and potentially more deceptive threat looming: voice fraud. Unlike high-definition video, the typical transmission quality of audio, especially in phone calls, is markedly low. The inherent imperfections ...
4 days ago Venturebeat.com
Worried About AI Voice Clone Scams? Create a Family Password - It's a classic and common scam, and like many scams it relies on a scary, urgent scenario to override the victim's common sense and make them more likely to send money. There's an easy and old-school trick you can use to preempt the scammers: ...
5 months ago Eff.org
PRODUCT REVIEW: MIXMODE PLATFORM FOR REAL-TIME THREAT DETECTION - Cybersecurity vendor MixMode has redefined the art and science of threat detection and response with its groundbreaking MixMode Platform. At its core, the MixMode Platform relies on a patented foundational model specifically engineered to detect and ...
5 months ago Cybersecurity-insiders.com
FTC offers $25,000 prize for detecting AI-enabled voice cloning - The U.S. Federal Trade Commission has started accepting submissions for its Voice Cloning Challenge, a public competition with a $25,000 top prize for ideas that protect consumers from the danger of AI-enabled voice cloning for fraudulent activity. ...
6 months ago Bleepingcomputer.com
Helping to keep the lights on in Ukraine in the face of electronic warfare - Ukraine's high-voltage electricity substations rely on GPS for time synchronization. Many of Ukraine's high-voltage electrical substations - which play a vital role in the country's domestic transmission of power - make extensive use of the ...
7 months ago Blog.talosintelligence.com
Cleafy improves banking security with real-time AI capabilities - In the ever-evolving landscape of banking and financial security, new malware variants poses a significant and imminent challenge. Traditionally, both the identification and classification of these threats only occurred post-attack, leaving banks and ...
6 months ago Helpnetsecurity.com
Real-Time Data Warehousing Based on Apache Doris - This is a whole-journey guide for Apache Doris users, especially those from the financial sector, which requires a high level of data security and availability. If you don't know how to build a real-time data pipeline and make the most of the Apache ...
5 months ago Feeds.dzone.com
The Role of Machine Learning in Cybersecurity - Machine learning plays a crucial role in cybersecurity by enhancing defense mechanisms and protecting sensitive information. The key advantage of using machine learning in cybersecurity is its ability to constantly adapt and learn from new threats. ...
4 months ago Securityzap.com
Kaspersky releases free tool that scans Linux for known threats - Kaspersky has released a new virus removal tool named KVRT for the Linux platform, allowing users to scan their systems and remove malware and other known threats for free. Kaspersky's new tool isn't a real-time threat protection tool but a ...
1 month ago Bleepingcomputer.com
Edge Computing: Data and Connectivity - Edge computing is a distributed computing model that brings processing capabilities closer to the data source, be it IoT devices, sensors, or end-user devices, rather than relying on centralized data centers. By decentralizing data processing, edge ...
6 months ago Feeds.dzone.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)