AI-driven scams have become a severe yet silent threat to our daily livelihood. But really, what are cloning scams? With technology changing the world for good, scammers are leveraging AI for their malicious gains. Initially, this tech was developed to generate natural-sounding voices for computer-generated responses and cinemas.
Now, scammers are using deepfake artificial intelligence to generate templates based on individual voice samples to mimic targets and scam their victims. However, you can get one step ahead with these kinds of scams, and here’s how.
1. Learn About the Latest Technology
AI technology is constantly evolving, and scammers are finding a way to keep moving with it. If you are not up to date in this digital era, you are more susceptible to falling for scams. One of the most straightforward ways to stay updated on the latest scams is to read reputable tech blogs.
You can also experiment and play around with different new technologies and platforms to get first-hand information. Read about the most recent scamming cases and expert advice on how to protect yourself against similar scams.
2. Avoid Sharing Personal Data
Most people and companies keep their personal information locked away for safety. Such data include social security numbers, addresses, account numbers, account data, and everything in between that embodies personal identity. If any of this sensitive info falls into the wrong hands, it can lead to fraud or identity theft.
Start by handling all your personal information discreetly. In case you have something you need to dispose of like registration forms or expired credit cards, do it carefully. Also, avoid oversharing such information, especially in a way that is accessible to the general public.
3. Don’t Share Audio and Videos on Social Platforms
Oversharing on social platforms can be very tempting today, and, therefore, it is easy to overlook the security concerns that come with it. With modern tech, voice clones can be done using recordings that are even three seconds long. If you have to share any voice recordings or videos online, restrict access and usage through access control systems, confidentiality agreements, or ethical guidelines.
4. Check the Caller’s Urgency for Red Flags
One of the most common ways scammers use to trap their victims to fall into their schemes is by creating urgency around their call to action. They create situations that require immediate response or have a time limit attached to them. It is their best chance to get away with the scam before being detected. Before you give in to an urgent request over a phone call from someone you can barely recognize, take a step back. If need be, hang up first and do some basic research about the caller and some of the information they shared.
5. Block Spammy-Looking Numbers
One of the most straightforward ways to keep spam calls at bay is by blocking spammy-looking numbers. Most network providers have blocking services. But if you need additional protection, there are a number of similar apps available for download, such as Truecaller, for both free and paid users. Some of the apps also double up as caller identifiers and reveal the identity of the caller which helps flag reported spam numbers.
6. Use Robust Security Quizzes
They are a great way to enhance identity verification, especially when signing in to an account or service online. The two main types of security questions are user-defined and system-defined quizzes. The level of security with user-defined questions depends highly on solid answers. However, system-defined questions are generated based on what the system already knows about the user, making it harder for other people to get through.
7. Improvise Security Codes
As a way to block out scammers playing relative, create a secure word or code exclusive to close people only. This code should be memorized and never to be documented. The code request will be useful if a scammer already knows much about you. It also makes it easier to distinguish between an emergency situation from relatives or friends and a scamming attempt.
8. Be Keen With Unsolicited Callers
Voice scammers may have cloned a voice, but they sure can’t clone a phone number. Beware of new callers or those marked as spam by caller identity tools. If you answer a call that does not sound legitimate, you should hang up and call back later using the number they gave you person to really be sure. The same goes for those keeping you on the phone long enough to get a recording of your voice for cloning. Bottomline, it is okay to end the call if it doesn’t sound right.
9. Secure the Accounts
If scammers have already managed to clone your voice, having a multiple-factor authentication on your accounts makes it harder for them to access. MFAs act as an additional security layer requesting additional information, such as a verification code on your phone or email or a call back along with your account’s password. You have options of adding two or multiple of these layers depending on the sensitivity of the accounts and the security you need.
10. Trust Your Guts
Most scammers leverage emotional manipulation to get to your wallet. They are skilled at playing on emotions, using empathy and distress to get to you. They will use made-up situations that will cloud your judgment, such as a medical emergency, a traumatic accident, or severe consequences if the request is not met, exploiting your natural instincts to offer help. Luckily, in such situations, your instincts can detect when something is off. So, trust your gut, and avoid rushing into making a move before digging into it more to assess the real situation.
All in all, even the most careful person can be duped. The above techniques can be useful to voice clone scams that are even yet to be invented, like more realistic deepfakes and machine-generated responses. However, the most crucial step to take if you find yourself in the middle of a voice clone scam is to hang up. This will not only allow you a minute to step back, breathe, and critically think about the situation, but also prevent your voice from being cloned in the process, breaking the scamming cycle.