Connect with us

Technology

FBI's new warning about AI-driven scams that are after your cash

Published

on

FBI's new warning about AI-driven scams that are after your cash

The FBI is issuing a warning that criminals are increasingly using generative AI technologies, particularly deepfakes, to exploit unsuspecting individuals. This alert serves as a reminder of the growing sophistication and accessibility of these technologies and the urgent need for vigilance in protecting ourselves from potential scams. Let’s explore what deepfakes are, how they’re being used by criminals and what steps you can take to safeguard your personal information.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

FBI building in D.C. (Kurt “CyberGuy” Knutsson)

The rise of deepfake technology

Deepfakes refer to AI-generated content that can convincingly mimic real people, including their voices, images and videos. Criminals are using these techniques to impersonate individuals, often in crisis situations. For instance, they might generate audio clips that sound like a loved one asking for urgent financial assistance or even create real-time video calls that appear to involve company executives or law enforcement officials. The FBI has identified 17 common techniques used by criminals to create these deceptive materials.

Advertisement

Image of AI illustration (Kurt “CyberGuy” Knutsson)

THE AI-POWERED GRANDMA TAKING ON SCAMMERS

Key tactics used by criminals

The FBI has identified 17 common techniques that criminals are using to exploit generative AI technologies, particularly deepfakes, for fraudulent activities. Here is a comprehensive list of these techniques.

1) Voice cloning: Generating audio clips that mimic the voice of a family member or other trusted individuals to manipulate victims.

2) Real-time video calls: Creating fake video interactions that appear to involve authority figures, such as law enforcement or corporate executives.

Advertisement

3) Social engineering: Utilizing emotional appeals to manipulate victims into revealing personal information or transferring funds.

4) AI-generated text: Crafting realistic written messages for phishing attacks and social engineering schemes, making them appear credible.

5) AI-generated images: Using synthetic images to create believable profiles on social media or fraudulent websites.

6) AI-generated videos: Producing convincing videos that can be used in scams, including investment frauds or impersonation schemes.

7) Creating fake social media profiles: Establishing fraudulent accounts that use AI-generated content to deceive others.

Advertisement

8) Phishing emails: Sending emails that appear legitimate but are crafted using AI to trick recipients into providing sensitive information.

9) Impersonation of public figures: Using deepfake technology to create videos or audio clips that mimic well-known personalities for scams.

10) Fake identification documents: Generating fraudulent IDs, such as driver’s licenses or credentials, for identity fraud and impersonation.

11) Investment fraud schemes: Deploying AI-generated materials to convince victims to invest in non-existent opportunities.

12) Ransom demands: Impersonating loved ones in distress to solicit ransom payments from victims.

Advertisement

13) Manipulating voice recognition systems: Using cloned voices to bypass security measures that rely on voice authentication.

14) Fake charity appeals: Creating deepfake content that solicits donations under false pretenses, often during crises.

15) Business email compromise: Crafting emails that appear to come from executives or trusted contacts to authorize fraudulent transactions.

16) Creating misinformation campaigns: Utilizing deepfake videos as part of broader disinformation efforts, particularly around significant events like elections.

17) Exploiting crisis situations: Generating urgent requests for help or money during emergencies, leveraging emotional manipulation.

Advertisement

Image of AI illustration (Kurt “CyberGuy” Knutsson)

These tactics highlight the increasing sophistication of fraud schemes facilitated by generative AI and the importance of vigilance in protecting personal information.

FCC NAMES ITS FIRST-EVER AI SCAMMER IN THREAT ALERT

Tips for protecting yourself from deepfakes

Implementing the following strategies can enhance your security and awareness against deepfake-related fraud.

1) Limit your online presence: Reduce the amount of personal information, especially high-quality images and videos, available on social media by adjusting privacy settings.

Advertisement

2) Invest in personal data removal services: The less information is out there, the harder it is for someone to create a deepfake of you. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

3) Avoid sharing sensitive information: Never disclose personal details or financial information to strangers online or over the phone.

4) Stay vigilant with new connections: Be cautious when accepting new friends or connections on social media; verify their authenticity before engaging.

5) Check privacy settings on social media: Ensure that your profiles are set to private and that you only accept friend requests from trusted individuals. Here’s how to switch any social media accounts, including Facebook, Instagram, Twitter and any others you may use, to private.

6) Use two-factor authentication (2FA): Implement 2FA on your accounts to add an extra layer of security against unauthorized access.

Advertisement

7) Verify callers: If you receive a suspicious call, hang up and independently verify the caller’s identity by contacting their organization through official channels.

8) Watermark your media: When sharing photos or videos online, consider using digital watermarks to deter unauthorized use.

9) Monitor your accounts regularly: Keep an eye on your financial and online accounts for any unusual activity that could indicate fraud.

10) Use strong and unique passwords: Employ different passwords for various accounts to prevent a single breach from compromising multiple services. Consider using a password manager to generate and store complex passwords.

11) Regularly backup your data: Maintain backups of important data to protect against ransomware attacks and ensure recovery in case of data loss.

Advertisement

12) Create a secret verification phrase: Establish a unique word or phrase with family and friends to verify identities during unexpected communications.

13) Be aware of visual imperfections: Look for subtle flaws in images or videos, such as distorted features or unnatural movements, which may indicate manipulation.

14) Listen for anomalies in voice: Pay attention to the tone, pitch and choice of words in audio clips. AI-generated voices may sound unnatural or robotic.

15) Don’t click on links or download attachments from suspicious sources: Be cautious when receiving emails, direct messages, texts, phone calls or other digital communications if the source is unknown. This is especially true if the message is demanding that you act fast, such as claiming your computer has been hacked or that you have won a prize. Deepfake creators attempt to manipulate your emotions, so you download malware or share personal information. Always think before you click.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Advertisement

16) Be cautious with money transfers: Do not send money, gift cards or cryptocurrencies to people you do not know or have met only online or over the phone.

17) Report suspicious activity: If you suspect that you have been targeted by scammers or have fallen victim to a fraud scheme, report it to the FBI’s Internet Crime Complaint Center

A woman typing on her laptop (Kurt “CyberGuy” Knutsson)

By following these tips, individuals can better protect themselves from the risks associated with deepfake technology and related scams.

30% OF AMERICANS OVER 65 WANT TO BE REMOVED FROM THE WEB. HERE’S WHY

Advertisement

Kurt’s key takeaways

The increasing use of generative AI technologies, particularly deepfakes, by criminals highlights a pressing need for awareness and caution. As the FBI warns, these sophisticated tools enable fraudsters to impersonate individuals convincingly, making scams harder to detect and more believable than ever. It’s crucial for everyone to understand the tactics employed by these criminals and to take proactive steps to protect their personal information. By staying informed about the risks and implementing security measures, such as verifying identities and limiting online exposure, we can better safeguard ourselves against these emerging threats.

In what ways do you think businesses and governments should respond to the growing threat of AI-powered fraud? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Technology

How Last Samurai Standing adds kinetic action to the Battle Royale formula

Published

on

How Last Samurai Standing adds kinetic action to the Battle Royale formula

Last Samurai Standing begins with a familiar premise. Desperate samurai dispossessed by the restoration of the emperor enter into a deadly game for a life-changing cash prize — all for the entertainment of anonymous elites. Unlike its inspirations Battle Royale and Squid Game, however, Last Samurai Standing’s violence is chaotic, fast-paced, and kinetic, though it hides a careful choreography that makes the series a more electric proposition than its predecessors.

Viewers have Junichi Okada to thank for that. As well as starring in and producing Last Samurai Standing, he serves as the series’ action planner. Many will be familiar with the results of an action planner’s work — sometimes called an action director, elsewhere a “coordinator,” and even “choreographer” — though perhaps not what the role entails. In the case of Last Samurai Standing, it’s a role that touches on nearly every aspect of the production, from the story to the action itself.

“I was involved from the script stage, thinking about what kind of action we wanted and how we would present it in the context of this story,” Okada tells The Verge. “If the director [Michihito Fujii] said, ‘I want to shoot this kind of battle scene,’ I would then think through the content and concept, design the scene, and ultimately translate that into script pages.”

The close relationship between the writer and director extends to other departments, too. Though an action planner’s role starts with managing fight scenes and stunt performers, they also liaise with camera, wardrobe, makeup, and even editorial departments to ensure fight scenes cohere with the rest of the production.

Image: Netflix

Advertisement

It’s a role which might appear a natural progression for Okada, who is certified to teach Kali and Jeet Kune Do — a martial art conceived by Bruce Lee — and holds multiple black belts in jiujitsu. Though the roots of his progression into action planning can be traced back further, to 1995 when he became the youngest member of J-pop group V6.

“Dance experience connects directly to creating action,” he says. “[In both] rhythm and control of the body are extremely important.” Joining V6 at the age of 15, that experience has made Okada conscious of how he moves in relation to a camera during choreography, how he is seen within the structure of a shot, and, critical to action planning, how to navigate all of that safely from a young age.

That J-pop stardom also offered avenues into acting, initially in roles you might expect for a young pop star: comic heartthrobs and sitcom sons. But he was steadily able to broaden his output. A starring turn in Hirokazu Kore-eda’s Hana followed, as did voice acting in Studio Ghibli’s Tales From Earthsea and From Up on Poppy Hill. A more telling departure was a starring role in 2007’s SP, in which he played a rookie in a police bodyguard unit, for which he trained for several years under shootfighting instructor Yorinaga Nakamura.

“What I care about is whether audiences feel that ‘this man really lives here as a samurai.’”

In the years since, Okada has cemented himself as one of Japan’s most recognizable actors, hopping between action starring roles in The Fable to sweeping period epics like Sekigahara. Those two genres converge in his Last Samurai Standing role of Shujiro, a former Shogunate samurai now reduced to poverty, working through his PTSD and reckoning with his bloodthirsty past in the game. These days, it’s less of a concern that the character butts up against his past idol image, he suggests. “What I care about is whether audiences feel that ‘this man really lives here as a samurai.’”

Advertisement

For Okada’s work on Last Samurai Standing, as both producer and action planner, that involved lacing high-octane but believable action with the respect for history and character studies of the period dramas he loves. “Rather than being 100 percent faithful to historical accuracy,” he adds, “my goal was to focus on entertainment and story, while letting the ‘DNA’ and beauty of Japanese period drama gently float up in the background.”

A focus on what he defines as “‘dō’ — movement,” pure entertainment that “never lets the audience get bored” punctuated — with “‘ma,’” the active emptiness that connects those frenetic moments. Both can be conversations, even if one uses words and another communicates dialogue through sword blows. This is most apparent when Shujiro faces his former comrade Sakura (Yasushi Fuchikami) inside a claustrophobic bank vault that serves as a charnel house for the game’s less fortunate contestants.

“The whole battle is divided into three sequences,” Okada says. The first starts with a moment of almost perfect stillness, a deep breath, before the two launch into battle. “A fight where pride and mutual respect collide,” he says, “and where the speed of the techniques reaches a level that really surprises the audience.” It’s all captured in one, zooming take with fast, tightly choreographed action reminiscent of Donnie Yen and Wu Jing in Kill Zone.

So intense is their duel that both shatter multiple swords. The next phase sees them lash out in a more desperate and brutal manner with whatever weapons they find. Finally, having fought to a weary stalemate, the fight becomes, Okada concludes, “a kind of duel where their stubbornness and will are fully exposed” as they hack at each other with shattered blades and spear fragments.

A still image from the Netflix series Last Samurai Standing.

Image: Netflix

It’s a rhythm that many fights in Last Samurai Standing follow, driven by a string of physical and emotional considerations that form the basis of an action planner’s tool kit: how and why someone fights based on who they are and their environment. Here it is two former samurai in an elegant and terrifyingly fast-paced duel. Elsewhere we see skill matched against brutality, or inexperience against expertise.

Advertisement

“I define a clear concept for each sequence,” Okada says, before he opens those concepts up to the broader team. From there, he might add notes, but in Last Samurai Standing, action is a collaborative affair. “We keep refining,” he says. “It’s a back-and-forth process of shaping the sequence using both the ideas the team brings and the choreography I create myself.”

There is a third factor which Okada believes is the series’ most defining. “If we get to continue the story,” he says, “I’d love to explore how much more we can lean into ‘sei’ — stillness, and bring in even more of a classical period drama feel.”

As much of a triumph of action as Last Samurai Standing is, its quietest moments are the ones that stay with you. The charged looks between Shujiro and Iroha (Kaya Kiyohara) or their shuddering fright when confronted with specters of their past. Most of all, Shujiro watching his young ward, Futaba Katsuki (Yumia Fujisaki), dance before a waterlogged torii as mist hovers. These pauses are what elevate and invigorate the breathless action above spectacle.

The pauses are also emblematic of the balance that Last Samurai Standing strikes between its period setting and pushing the boundaries of action, all to inject new excitement into the genre. “Japan is a country that values tradition and everything it has built up over time. That’s why moments where you try to update things are always difficult,” Okada says. “But right now, we’re in the middle of that transformation.”

That is an evolution that Okada hopes to support through his work, both in front of and behind the camera. If he can create avenues for new generations of talent to carry Japanese media to a broader audience and his team to achieve greater success on a global stage, “that would make me very happy,” he says. “I want to keep doing whatever I can to help make that possible.”

Advertisement

The first season of Last Samurai Standing is streaming on Netflix now, and a second season was just confirmed.

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Advertisement
Continue Reading

Technology

Free up iPhone storage by deleting large attachments

Published

on

Free up iPhone storage by deleting large attachments

NEWYou can now listen to Fox News articles!

If your iPhone keeps warning you about low storage, your Messages app may be part of the problem. Photos, videos and documents saved inside your text threads can stack up fast. The good news is that you can clear those big files without erasing entire conversations.

Below, you will find simple steps that work on the latest iOS 26.1. These steps help you clean up storage while keeping your messages right where you want them.

If you haven’t updated to iOS 26.1, go to Settings > General > Software Update to install the latest version.

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.      

Advertisement

‘CLOUD STORAGE FULL’ SCAM STEALS YOUR PHOTOS AND MONEY

An iPhone displays a low-storage alert as large photos, videos and documents saved in Messages fill device space, prompting users to remove files without deleting entire conversations. (Cyberguy.com)

Why clearing attachments helps your iPhone run better

Removing large attachments gives you quick breathing room on your iPhone. It can free up gigabytes in seconds, especially if you text lots of photos or videos. Clearing old files also keeps your message threads tidy and helps your device run more smoothly by reducing the amount of storage your system needs to manage. The best part is that you can clean up everything without losing a single conversation.

How to delete attachments but keep your conversations on iPhone 

These quick steps help you clear large files from Messages while keeping every conversation intact.

  • Launch the Messages app on your iPhone
  • Open the conversation thread that holds the attachments you want to delete.
  • Tap on the name of the contact(s) in the text thread.

To the right of Info, click on Photos or Documents; you may need to swipe over other tabs to see these. Photos will also contain videos and GIFs, while documents will contain Word documents, PDFs and other types of files.

  • Hold your finger and long-press on a photo, video or document until a menu appears.
  • Tap Delete to remove that single file.

Then confirm Delete when asked.

How to delete multiple files on your iPhone at once

To clear out several attachments at once, follow these quick steps on your iPhone.

Advertisement

Deleting attachments in Messages quickly frees space without losing your conversations. (Sean Gallup/Getty Images)

  • Go back to the Photos or Documents tab.
  • Tap Edit.
  • Click Select documents or Select Photos 
  • Tap on the photos or documents that you want to remove. You will see a blue checkmark appear in the bottom-right corner.
  • Tap the trash icon in the bottom right corner.

Confirm you want to delete the selected attachments by clicking Delete Photos.

These steps work almost the same way on an iPad. After you finish, you will often see an instant boost in available storage.

How to review large attachments in settings and delete them 

If you want to clear the biggest files on your device, you can check them from your iPhone’s storage screen and delete them:

  • Open Settings
  • Tap General
  • Choose iPhone Storage
  • Tap Messages
  • Click Review Large Attachments to see photos, videos and attachments taking up storage in Messages.
  • Click Edit.
  • Select items to delete by clicking the circle next to the attachment you want to delete. A blue checkmark will appear.

Then, tap the trash can icon in the upper right to delete it.

APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERS

This method gives you a quick overview of what takes up the most space and lets you delete it quickly.

Advertisement

IPhone users can clear large photos, videos and files from Messages using built-in storage tools, helping free space, keep conversations intact and improve device performance. (Cyberguy.com)

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Freeing up storage doesn’t have to be confusing. A few quick taps can remove bulky files and keep your conversations intact. With these simple steps, your iPhone stays organized, runs smoothly and is ready for more photos, videos and apps.

What is the one type of attachment that takes up the most space on your iPhone? Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

Copyright 2025 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading

Technology

The FCC’s foreign drone ban is here

Published

on

The FCC’s foreign drone ban is here

The Federal Communications Commission has banned new drones made in foreign countries from being imported into the US unless the Department of Defense or the Department of Homeland Security recommends them. Monday’s action added drones to the FCC’s Covered List, qualifying foreign-made drones and drone parts, like those from DJI, as communications equipment representing “unacceptable risks to the national security of the United States and to the safety and security of U.S. persons.”

DJI is “disappointed” by today’s action, Adam Welsh, DJI’s head of global policy, says in a statement. “While DJI was not singled out, no information has been released regarding what information was used by the Executive Branch in reaching its determination.” Welsh adds that DJI “remains committed to the U.S. market” and noted that existing products can continue operation as usual. Other items on the FCC’s list include Kaspersky anti-virus software (added in 2024) and telecommunications equipment from Huawei and ZTE (added in 2021).

The FCC says it received a National Security Determination on December 21st from an interagency body saying that “uncrewed aircraft systems” (UAS) and critical UAS components produced in a foreign country could “enable persistent surveillance, data exfiltration, and destructive operations over U.S. territory” and that “U.S. cybersecurity and critical‑infrastructure guidance has repeatedly highlighted how foreign‑manufactured UAS can be used to harvest sensitive data, used to enable remote unauthorized access, or disabled at will via software updates.”

If you already own a drone made outside the US, you will still be able to use it, according to the FCC’s fact sheet. Drones or drone components can be removed from the Covered List if the DoD or DHS “makes a specific determination to the FCC” that it does not pose unacceptable risks.

“Unmanned aircraft systems (UAS), also known as drones, offer the potential to enhance public safety as well as cement America’s leadership in global innovation,” FCC chairman Brendan Carr says.

Advertisement
Continue Reading
Advertisement

Trending