Genei, the future of fraud and why can you be an easy target

“Mom, mine! I had an accident and I need money right away!”
The sound on the phone looks exactly like your child, but it is actually an artificial intelligence clone formed from a three -second clip of Facebook. Welcome to the new world that works with artificial intelligence. Productive Artificial Intelligence (GENAi) gave a strong new vehicle set that made yesterday’s e -mail fraud comparison with the comparison of the E -Post fraudsters.
The sophisticated fraud techniques that emerge today cannot almost be detected for the uneducated eye or ear. And the financial impact is surprising. Identity Hunt and Deception Efficiency since 2020 94 % increasedMonthly with millions of new scam pages. Experts who are even more worried, will predict the losses of Frauds working with AI Reach 40 billion dollars In the USA until 2027.
A man who wrote on his laptop. (Kurt “Cyberguy” Knutsson)
What is productive artificial intelligence and why should you care?
Based on the data they are trained, the productive AI refers to new content-text, images, audio or video-leaving artificial intelligence systems. Unlike traditional artificial intelligence that analyze the existing information, productive AI produces completely new, convincing content. Most related part? These powerful tools are increasingly accessible for fraudsters who use it to create sophisticated fraud that is more difficult to detect.

A woman working on her laptop. (Kurt “Cyberguy” Knutsson)
Best antivirus for Mac, PC, iPhone and Androids – Cyberguy selections
How do scammers armed Genai
Today’s scammers provide a completely new type of fraud, while using productive artificial intelligence to “super charge” existing techniques. Dave SchroederUW – Madison National Security Research Strategist. Here are the four most dangerous ways to use this technology.
Sound cloning: 3 -second threat
Only three seconds of social media, voice messages, or videos, can create a convincing copy of your voice using AI AI. Schroeder, “a ‘family member’ ‘phone number, and imagine a situation that says they have been kidnapped.” “The victims of these scammers said they were sure that family members were the voice.”
This can be used to direct sound clones produced by AI to direct their loved ones, colleagues, and even financial institutions to transfer money or share sensitive information, which makes it difficult to distinguish real and fraudulent calls.
Fake ID Documents
Today’s AI tools can create convincing fake identity documents with images created by AI. Criminals use them to confirm the identity when opening an account fraudulent or taking over the existing ones. This is becoming increasingly more sophisticated, including false identities produced by AI, which can skip traditional security controls and even deceive automatic verification systems.
Deepfake Selfie’s
Many financial institutions use selfie for customer verification. However, fraudsters can take images from social media to create deep teeth that skip these security measures. The deep teeth produced by this AI are not limited to still images; They can also produce realistic videos that can deceive animation detection controls during facial recognition processes and pose a significant threat to biometric authentication systems.
Hyper-personalized identity hunt
Similarly, Genai is now perfectly written, extremely personalized ID Hunt E -Posts This analyzes your online presence to create specially adapted messages according to your interests and personal information. These AI-Trained Identity Hunt trials may include sophisticated chat boots and improved grammar, which can make them significantly more convincing and detecting them than traditional. ID Hunt fraud.

A man working on his laptop. (Kurt “Cyberguy” Knutsson)
How can you protect your data from IRS scammers
Why can you be the main target
Although everyone is at risk of this sophisticated AI fraud, some factors can make you a more attractive target for fraudsters. Those with significant retirement savings or investments naturally represent more valuable goals – the more assets you have, the more interests you will attract from criminals looking for larger returns. Many elderly adults are particularly vulnerable, as they do not grow up with today’s technology and may be less familiar with AI’s abilities. This gap makes it difficult to recognize that AI is used in a malicious way. Combining this risk is a comprehensive digital footprint: if you are active on social media or if you have a significant online presence, you offer fraudsters to the fraudsters designed to exploit your confidence and the raw materials they need to create highly personalized frauds.
What is Artificial Intelligence (AI)?

A woman working on her laptop. (Kurt “Cyberguy” Knutsson)
FBI warns the dangerous new ‘smashing’ that targets your phone.
How can you protect yourself in the age of artificial intelligence
Protection against threats that work with artificial intelligence requires a multi -layered approach that goes far beyond digital measures. Awareness is your first line of defense – understanding how these frauds work helps you detect red flags before they become a victim. This awareness should be matched with both digital measures and “analog” verification systems that exist completely offline. Here are some important steps to protect yourself:
1. Investment in Personal Data Removal Services: Productive AI basically needs to convincing your personal data, so limiting your online footprint has become very important in today’s fraud view. If less information about you is open to everyone, it has to work with less raw material scammers. Going completely out of grille is not realistic for most of us today-as he never leaves your house. However, you can significantly reduce your online footprint with a personal data removal service, such as Incogni, which will significantly expose yourself to AI -supported fraud.
By removing your personal data from data broker companies, you not only protect yourself from geai running fraud, but you will also get many other privacy benefits, such as decreasing risks of taking spam and falling to identity theft and helping to prevent follow -up and harassment. As artificial intelligence technology progresses, gene-an fraud will only become more complex. Although no service does not promise to remove all your data from the internet, if you want to constantly monitor and automate your information, have a lifting service, to monitor and automate the process of lifting from hundreds of sites for a longer time. Check out my best choices for data removal services.
Click here and get Fox Business on movement
2. Create your own verification protocols: Consider the agreement on a “safe word” that only family members know. If you get an unexpected call from a relative of distress, ask for this word before taking action.
3. Select strong, unique passwords for each account: Create complex passwords using a combination of capital letters, numbers and special characters. Avoid using easily predictable information, such as birthdays or common words. Think about using Password manager To create and store complex passwords. A password manager can create and store strong, unique passwords for all your accounts, reduces the risk of reusing passwords and facilitates good password hygiene. Get more details about me Password managers reviewed by the best expert in 2025.
4. Enable authentication (2FA) with two factors in all accounts: 2FA In addition to your password, it adds an extra safety layer, requiring a second form of verification, such as the code sent to your phone.
5. When possible, instead of E -POSTA, take MFA codes on your phone through an Identity Valider Application: One Authenticator application Like Microsoft Authenticator or Google Authenticator, it is safer than e -mail. Authenticator applications form one-time passwords (TOTP) that is not transmitted via e-mail or SMS and reduce the risk of intervention of computer pirates. In addition, identity verifying applications usually support the verification process both safe and useful by supporting biometric authentication and push notifications.
6. Use a strong antivirus software: Modern cyber security threats are rapidly developing, artificial intelligence is used to create more convincing identity hunting attacks, deep leaf fraud and malware. Investing in powerful antivirus software can help define and block the suspicious activity before you reach you. The best way to protect yourself from malicious connections that uploaded malware that accesses your private information is to have a strong antivirus software on all your devices. This protection can warn you about identity hunting and ransom software fraud by keeping your personal information and digital assets safe. Get my choices for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
7. Trust and verify your intuition: If something feels “closed”, trust your instincts, as you notice unusual expressions or strange background sounds. Don’t let scammers create a wrong sense of urgency. If you receive a communication that claims to be from a financial institution, call this institution directly from the website using the official number.
8. Watch your accounts: Regularly examine the account statements for suspicious transactions. If you suspect that your data is in danger, feel free to demand credit ice cream.
Subscribe to Kurt’s Youtube channel for fast video tips on how to work all your technology devices
Kurt’s basic inferences
So, is that a little scary? Definitely. But the good news is that now you are armed with information to fight. Be careful, take these protective steps seriously and remember that a slightly healthy skepticism has made a long way in this new AI fraud. Let’s make it much more difficult for the scammers working with this AI to succeed.
Click here to get the Fox News app
Do you think technology companies do enough to protect us against AI -supported fraud and fraud? Type us by writing to us Cyberguy.com/contact
For more information for my technology tips and security warnings, Cyberguy.com/newsletter
Ask Kurt a question or let us know which stories you want to take.
Follow Kurt on social channels:
Answers to the most desired cyberguy questions:
New from Kurt:
Copyright 2025 Cyberguy.com. All rights reserved.