Truecaller AI Call Scanner detects AI voice clones in real-time

Illegitimate voice cloning and speech synthesis technologies are improving at an incalculable rate of change and are already commoditized and ubiquitous.
This next wave of AI scams will prey on the most vulnerable side of our psyche: the threat of our loved ones in danger.
Truecaller announced the latest salvo in its arsenal of spam and scam fighting abilities: the AI Call Scanner.
AI Call Scanner is trained to detect and differentiate between human voices and AI-synthesized voices, empowering people to safeguard themselves against potential scams and fraudulent activities.
The AI Call Scanner is built right into the Truecaller Android app, is part of the Premium subscription and is being rolled out in the US first, with plans to launch globally.
The system is designed with simplicity and effectiveness in mind.
If a person receives a suspicious call, all they have to do is tap a dedicated button within the Truecaller interface.
The caller's voice is recorded and this voice sample is then processed by advanced AI model, which has been trained to identify the unique characteristics of human speech and distinguish it from AI-generated voices.
All this happens in just a few seconds and with a high degree of accuracy.
While AI Call Scanner is launching on Android first, Truecaller is exploring avenues for further improvement and expansion, including an imminent iOS launch.
Truecaller's team is actively researching ways to refine the AI model's accuracy, reduce response times, and adapt to emerging trends in voice synthesis technology.
Truecaller is considering the potential integration of AI Call Scanner with other communication platforms and devices to extend its reach and impact; for example, building a chatbot where people can forward recorded clips for detection.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Wed, 29 May 2024 13:13:06 +0000


Cyber News related to Truecaller AI Call Scanner detects AI voice clones in real-time

Truecaller AI Call Scanner detects AI voice clones in real-time - Illegitimate voice cloning and speech synthesis technologies are improving at an incalculable rate of change and are already commoditized and ubiquitous. This next wave of AI scams will prey on the most vulnerable side of our psyche: the threat of ...
1 year ago Helpnetsecurity.com
Adobe Real-Time CDP: Personalized Customer Experience - Adobe Experience Cloud Products like Adobe Real-Time CDP are available to assist. A revolutionary solution called Adobe Real-Time Customer Data Platform was created to assist companies in realizing the whole value of their customer data. Adobe ...
1 year ago Hackread.com
Truecaller Introduces AI Voice Feature for Personalized Call Responses - The Caller ID company Truecaller will now allow users to create an AI version of their voice to answer calls. Truecaller, known for identifying and blocking spam calls, is introducing a new feature for users with access to its AI Assistant. By ...
1 year ago Cysecurity.news
Voice Assistants and Privacy: Striking the Right Balance - The pervasive presence of voice assistants in our lives is a testament to the power of technology and its potential for furthering human progress. Voice assistants are digital, voice-controlled devices that allow users to interact with a virtual ...
1 year ago Securityzap.com
Deep dive into synthetic voice phishing defense - Voice phishing attacks are an escalating threat and this alarming statistic highlights a pervasive lack of awareness among the general population. At the moment, different techniques are being used by both big and small businesses to fight back ...
1 year ago Cybersecurity-insiders.com
15 Best Bandwidth Monitoring Tools in 2025 - By providing real-time data on network usage, bandwidth monitoring tools enable proactive management and quick resolution of issues that could impact network performance. It provides real-time monitoring of network performance, traffic analysis, and ...
4 months ago Cybersecuritynews.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
15 PostgreSQL Monitoring Tools - 2025 - What is Good?What Could Be Better?Monitoring application performance, user experience, and errors.Some users find the pricing high, especially for larger environments.Continuous server, database, and infrastructure monitoring.The extensive feature ...
7 months ago Cybersecuritynews.com
ID R&D introduces voice clone detection to protect users against audio deepfakes - ID R&D introduced voice clone detection as a new option for its IDLive Voice liveness detection product. Detecting voice clones and audio deepfakes can prevent fraud and crime, deter bad actors, and help preserve trust in the authenticity of digital ...
1 year ago Helpnetsecurity.com
10 Best Ransomware Protection Tools - 2025 - It protects devices from ransomware and other cyber threats using advanced threat intelligence, behavioral analysis, and cloud-based technology. It monitors and prevents ransomware assaults on personal files and automatically restores encrypted ...
9 months ago Cybersecuritynews.com
10 Best Dark Web Monitoring Tools in 2025 - DarkOwl is a comprehensive dark web monitoring tool that provides organizations with real-time intelligence on emerging threats and data breaches. Recorded Future is a comprehensive dark web monitoring tool that leverages machine learning and ...
4 months ago Cybersecuritynews.com
15 Best Website Monitoring Tools in 2025 - What is Good ?What Could Be Better ?SolarWinds allows network, infrastructure, application, and other monitoring.SolarWinds’ security was questioned after a major breach.The platform’s interface is easy to set up and use.Basic monitoring ...
4 months ago Cybersecuritynews.com
15 Best Docker Monitoring Tools in 2025 - What is Good ?What Could Be Better ?cAdvisor monitors containers without much overhead because to its minimal resource footprint.Real-time monitoring is its main focus, and historical data storage is limited.It simplifies troubleshooting using ...
4 months ago Cybersecuritynews.com
20 Best Kubernetes Monitoring Tools in 2025 - Zabbix: Enterprise-grade monitoring with support for Kubernetes clusters, offering real-time metrics and alerting. Azure Monitoring: Comprehensive monitoring solution for Azure Kubernetes Service (AKS) with real-time metrics and logs. Kubernetes ...
4 months ago Cybersecuritynews.com
Google Chrome To Roll Out Real-Time Phishing Protection - Google Chrome has been protecting users from malicious websites and files with Safe Browsing, which maintains a locally-stored list updated every 30-60 minutes. To address it, Chrome is introducing a new version of Safe Browsing that provides ...
1 year ago Cybersecuritynews.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
5 months ago Cybersecuritynews.com
CVE-2024-37904 - Minder is an open source Software Supply Chain Security Platform. Minder's Git provider is vulnerable to a denial of service from a maliciously configured GitHub repository. The Git provider clones users repositories using the ...
1 year ago
Americans Receive Two Billion Spam Calls Per Month - US consumers were deluged with an estimated two billion spam and scam calls last month, according to new data from Truecaller. The Swedish provider of caller ID and call blocking services revealed the data as part of its new Monthly US Spam and Scam ...
2 years ago Infosecurity-magazine.com
Why Cybersecurity Businesses Need a Real-Time Collaboration Tool - When the Cybercrime in a Pandemic World study was released in late 2021, the report noted that cybersecurity threats had risen 81% since the coronavirus raised its ugly head. It was a time of restrictive lockdowns, stay-at-home orders, and mask ...
2 years ago Hackread.com
CVE-2022-48998 - In the Linux kernel, the following vulnerability has been resolved: powerpc/bpf/32: Fix Oops on tail call tests test_bpf tail call tests end up as: test_bpf: #0 Tail call leaf jited:1 85 PASS test_bpf: #1 Tail call 2 jited:1 111 PASS test_bpf: #2 ...
1 year ago Tenable.com
Is Imitation A Form Of Flattery? Scarlett Johansson Doesn't Think So - It all started when Open AI's CEO Sam Altman unveiled a new ChatGPT version that included a new voice assistant seemingly inspired by the movie Her. Controversy started bubbling over how Scarlett Johansson's AI assistant character influenced ...
1 year ago Blog.avast.com
Daon xSentinel minimizes generative AI voice fraud - Daon announced the addition of xSentinel, an expansion of its AI.X technology. xSentinel provides adaptive synthetic voice protection to create a layer of defense within any voice communication channel and enhance the identity verification ...
1 year ago Helpnetsecurity.com
FTC soliciting contest submissions to help tackle voice cloning technology - The Federal Trade Commission is now accepting submissions for a contest designed to spur development of products and policies to protect consumers from the malicious use of voice cloning technology, which has been fueled by the advance of ...
1 year ago Therecord.media
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
7 months ago Cybersecuritynews.com
The dangers of voice fraud: We can't detect what we can't see - Despite these concerns, there's a more subtle and potentially more deceptive threat looming: voice fraud. Unlike high-definition video, the typical transmission quality of audio, especially in phone calls, is markedly low. The inherent imperfections ...
1 year ago Venturebeat.com