Skip to content
Tech News
← Back to articles

Your Next Scam Call Could Sound Exactly Like Your Child. 77% of People Who Received One Lost Money.

read original get Fake Child Voice Simulator → more articles
Why This Matters

Advancements in AI voice cloning technology have made it easier for cybercriminals to impersonate individuals with high accuracy, leading to a surge in sophisticated scams that can result in significant financial losses. This development poses a serious threat to consumers and highlights the urgent need for increased awareness and protective measures in the digital age. The tech industry must prioritize developing tools and strategies to detect and prevent such AI-driven frauds to safeguard users.

Key Takeaways

Listen to this post

Key Takeaways One in four people have been targeted by the scam or know someone who has been, per McAfee’s research.

With just three seconds of audio, cybercriminals can clone someone’s voice with 85% accuracy.

If your phone lights up with a message from a desperate loved one, you might be the target of a sophisticated scam.

With recently developed AI voice cloning tools at their disposal, cybercriminals can replicate almost anyone’s voice and leave fake voicemail and text messages in an effort to scam people out of money, cybersecurity software company McAfee reported.

One in four people said they’d experienced an AI voice cloning scam or knew someone who had, according to McAfee’s global study, which surveyed 7,000 people.

Additionally, one in 10 people said they received a message from an AI voice clone — and 77% of them said they lost money as a result.

Of the respondents who lost money, 36% said they lost between $500 and $3,000, and 7% said they lost anywhere from $5,000 to $15,000.

In some cases, cybercriminals need just three seconds of audio to clone a person’s voice with 85% accuracy, according to researchers at McAfee Labs.

Such snippets are readily available online, as many people share videos of themselves on social media. Bad actors can also hack into voice recordings on personal devices.

... continue reading