Recently, the topic #AI fraud is breaking out across the country# has become a hot topic on the Internet. The person you are talking to via video on social software may not be the person you know, but a scammer disguised by AI. Many friends were shocked, "Are scams so advanced now?" "Can AI restore appearance and voice so realistically?" According to many media reports, "Someone was defrauded of 4.3 million in 10 minutes" is amazing! The scammers are getting more and more "ruthless"! What are the common methods of AI fraud? Follow the editor to take a look! 1. Sound Synthesis Generally speaking, scammers may extract a person's voice through recording. Harassment calls are usually the main way to obtain someone's voice. After obtaining a certain "sound source", the sound is synthesized to form the "dialogue" of the fraudulent call. 2. AI face-changing The human face effect is often more easily trusted by the victim. The scammer uses AI face-changing technology to disguise the face of someone who has a close relationship with the victim, and then wins the victim's trust through video. This type of fraud is generally precise. The scammer will screen out a specific target group and deceive the victim's trust through video calls. 3. Forward WeChat voice Although WeChat currently does not support voice forwarding, scammers can implement this function by installing voice files or specific plug-ins. After stealing the WeChat account, the scammer may forward the previous chat voice of the account owner to "borrow money" from his friends. 4. AI program screens victims Scammers often use AI to analyze all kinds of information posted by the public online. After locking in the target group, they will formulate certain fraudulent rhetoric based on their personal characteristics to achieve precise fraud. For example, they carry out financial fraud against people who often post financial analysis and share investment thoughts. How to prevent it? 1. Multiple verifications to confirm identity Be cautious if someone asks you to share personally identifiable information, such as your address, date of birth, or name. Be wary of unexpected calls, even from people you know, as the number on caller ID could be spoofed. Before transferring money online, you must verify the other party's identity by calling back their mobile phone number, meeting in person, etc. If you discover any risk, call the police for help in a timely manner. If someone claims to be an "acquaintance" or "leader" and uses social software or text messages to induce you to remit money for various reasons, be sure to verify and confirm by calling the other party's mobile phone number or meeting in person. Do not transfer money without verification, and do not easily disclose your ID card, bank card, verification code and other information. 2. Protect information and avoid temptation Do not easily provide personal biometric information such as face and fingerprints to others, and do not excessively disclose or share animated pictures, videos, etc. Do not click on unfamiliar links, do not download unfamiliar software, and do not add unfamiliar friends casually to prevent your phone and computer from being infected with viruses, and your WeChat, QQ and other social software accounts from being stolen. 3. Improve safety awareness The public security, procuratorial and judicial organs do not have secure accounts, and the police will not handle cases online. If an online police officer says you have committed a crime, ask him to contact your local police station, or you can call 110 for consultation. If you are accidentally cheated or encounter suspicious situations, please be careful to protect the evidence and call 96110 to report it immediately. For the ever-changing smart AI scams, friends should raise their awareness of prevention. Once you discover a risk, call the police for help in time! |
<<: Weekly Achievements “Awards”丨“Confessions” of Scientific Climbers (Part 2)
>>: Lying down or standing up? There are many ways to transport a rocket
In the long history of the development of the tel...
Young man regains lost skill of high-rise rice no...
Original title: Planned to be launched this year,...
February 10th is the fifth "World Pulses Day...
1. Overview In iOS development, everyone is famil...
Produced by: Science Popularization China Author:...
On July 7, one of China's four largest asset ...
"Tesla has played its cards, and it's ou...
[[160813]] The original author, Fred Hebert, is a...
Being keen on breakthroughs in gameplay and ignor...
Scientists have long known that breathing air wit...
As mobile video consumption becomes more and more...
Zero-based small fresh pen light color course 202...
This course is specially prepared for friends who...
With the listing of Internet financial platforms ...