Connect with us

Technology

GenAI, the future of fraud and why you may be an easy target

Published

on

GenAI, the future of fraud and why you may be an easy target

“Mom, it’s me! I’ve been in an accident and need money right away!” 

The voice on the phone sounds exactly like your child, but it’s actually an artificial intelligence clone created from a three-second clip of his voice on Facebook. Welcome to the frightening new world of AI-powered fraud. Generative artificial intelligence (GenAI) has handed scammers a powerful new toolkit that makes yesterday’s email scams look amateur by comparison. 

The sophisticated fraud techniques emerging today are virtually undetectable to the untrained eye, or ear. And the financial impact is staggering. Since 2020, phishing and scam activity has increased by 94%, with millions of new scam pages appearing monthly. Even more alarming, experts estimate losses from AI-powered scams will reach $40 billion in the U.S. by 2027.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

A man typing on his laptop. (Kurt “CyberGuy” Knutsson)

Advertisement

What is generative AI and why should you care?

Generative AI refers to so-called artificial intelligence systems that create new content — text, images, audio or video — based on data they’ve been trained on. Unlike traditional AI that analyzes existing information, generative AI produces entirely new, convincing content. The most concerning part? These powerful tools are increasingly accessible to fraudsters who use them to create sophisticated scams that are harder than ever to detect.

woman works on laptop

A woman working on her laptop. (Kurt “CyberGuy” Knutsson)

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS — CYBERGUY PICKS

How fraudsters are weaponizing GenAI

Today’s scammers use generative AI to “supercharge” their existing techniques while enabling entirely new types of fraud, according to Dave Schroeder, UW–Madison national security research strategist. Here are the four most dangerous ways they’re using this technology.

Voice cloning: The 3-second threat

With just three seconds of audio, easily obtained from social media, voicemails or videos, fraudsters can create a convincing replica of your voice using AI. “Imagine a situation where a ‘family member’ calls from what appears to be their phone number and says they have been kidnapped,” explains Schroeder. “Victims of these scams have said they were sure it was their family member’s voice.” 

These AI-generated voice clones can be used to manipulate loved ones, coworkers or even financial institutions into transferring money or sharing sensitive information, making it increasingly difficult to distinguish between genuine and fraudulent calls.

Advertisement

Fake identification documents

Today’s AI tools can generate convincing fake identification documents with AI-generated images. Criminals use these to verify identity when fraudulently opening accounts or taking over existing ones. These AI-generated fake IDs are becoming increasingly sophisticated, often including realistic holograms and barcodes that can bypass traditional security checks and even fool automated verification systems.

Deepfake selfies

Many financial institutions use selfies for customer verification. However, fraudsters can take images from social media to create deepfakes that bypass these security measures. These AI-generated deepfakes are not limited to still images; they can also produce realistic videos that can fool liveness detection checks during facial recognition processes, posing a significant threat to biometric authentication systems.

Hyper-personalized phishing

Similarly, GenAI now crafts flawlessly written, highly personalized phishing emails that analyze your online presence to create messages specifically tailored to your interests and personal details. These AI-enhanced phishing attempts can also incorporate sophisticated chatbots and improved grammar, making them significantly more convincing and harder to detect than traditional phishing scams.

man on laptop

A man working on his laptop. (Kurt “CyberGuy” Knutsson)

HOW TO PROTECT YOUR DATA FROM IRS SCAMMERS THIS TAX SEASON

Why you might be a prime target

While everyone is at risk from these sophisticated AI scams, certain factors can make you a more attractive target to fraudsters. Those with substantial retirement savings or investments naturally represent more valuable targets — the more assets you have, the more attention you’ll attract from criminals looking for bigger payoffs. Many older adults are particularly vulnerable as they didn’t grow up with today’s technology and may be less familiar with AI’s capabilities. This knowledge gap makes it harder to recognize when AI is being used maliciously. Compounding this risk is an extensive digital footprint: if you’re active on social media or have a significant online presence, you’re inadvertently providing fraudsters with the raw materials they need to create convincing deepfakes and highly personalized scams designed specifically to exploit your trust.

Advertisement

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

woman and a laptop

A woman working on her laptop. (Kurt “CyberGuy” Knutsson)

FBI WARNS OF DANGEROUS NEW ‘SMASHING’ SCAM TARGETING YOUR PHONE

How to protect yourself in the age of AI

Protection against AI-powered threats requires a multi-layered approach that goes well beyond just digital measures. Awareness is your first line of defense — understanding how these scams work helps you spot red flags before you become a victim. This awareness should be paired with both digital safeguards and “analog” verification systems that exist entirely offline. Here are some key steps to protect yourself:

1. Invest in personal data removal services: Generative AI fundamentally needs your personal data to craft convincing scams, which is why limiting your online footprint has become paramount in today’s fraud landscape. The less information about you that’s publicly available, the fewer raw materials scammers have to work with. Going completely off-grid is unrealistic for most of us today — much like never leaving your home. But you can reduce your online footprint substantially with a personal data removal service like Incogni, making yourself significantly less exposed to AI-powered scams. 

By removing your personal data from data broker companies, you not only protect yourself from GenAI-powered fraud but also gain numerous other privacy benefits, such as reduced risks of receiving spam and falling victim to identity theft, as well as helping to prevent stalking and harassment. As AI technology advances, gen-AI scams will only become more sophisticated. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

Advertisement

2. Establish your own verification protocols: Consider agreeing on a “safe word” that only family members know. If you receive an unexpected call from a relative in distress, ask for this word before taking action.

3. Choose strong, unique passwords for each account: Create complex passwords using a combination of uppercase and lowercase letters, numbers, and special characters. Avoid using easily guessable information like birthdays or common words. Consider using a password manager to generate and store complex passwords. A password manager can generate and store strong, unique passwords for all your accounts, reducing the risk of password reuse and making it easier to maintain good password hygiene. Get more details about my best expert-reviewed Password Managers of 2025 here.

4. Enable two-factor authentication (2FA) on all accounts: 2FA adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password.

5. Receive MFA codes via an authenticator app on your phone rather than email when possible: Using an authenticator app like Microsoft Authenticator or Google Authenticator is more secure than receiving codes via email. Authenticator apps generate time-based one-time passcodes (TOTPs) that are not transmitted over email or SMS, reducing the risk of interception by hackers. Additionally, authenticator apps often support biometric authentication and push notifications, making the verification process both secure and convenient.

Advertisement

6. Use a strong antivirus software: Modern cybersecurity threats are evolving rapidly, with AI being used to create more convincing phishing attacks, deepfake scams, and malware. Investing in strong antivirus software can help identify and block suspicious activity before it reaches you. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 

7. Trust your intuition and verify: If something feels “off,” like you notice unusual phrasing or strange background noises, trust your instincts. Don’t let fraudsters create a false sense of urgency. If you receive a communication claiming to be from a financial institution, call that institution directly using the official number from its website.

8. Monitor your accounts: Review account statements regularly for suspicious transactions. Don’t hesitate to request a credit freeze if you suspect your data has been compromised.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Kurt’s key takeaways

So, is this all a bit scary? Absolutely. But the good news is, you’re now armed with the knowledge to fight back. Stay alert, take those protective steps I mentioned seriously, and remember that a little healthy skepticism goes a long way in this new age of AI fraud. Let’s make it much harder for these AI-powered scams to succeed.

Advertisement

Do you think tech companies are doing enough to protect us against AI-powered scams and fraud? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.  

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Meta asks judge to throw out antitrust case mid-trial

Published

on

Meta asks judge to throw out antitrust case mid-trial

Meta has filed a motion for judgment on the antitrust case it’s currently fighting in court. The motion argues that the Federal Trade Commission (FTC) has failed to produce any evidence that Meta unlawfully monopolized part of the social networking market, something the government argues it did through its acquisitions of Instagram and WhatsApp.

The filing was submitted this evening, shortly after the FTC rested its case in a protracted trial before DC District Court Judge James Boasberg. “After five weeks of trial, it is clear that the FTC has failed to meet the legal standard required under antitrust law,” said Meta spokesperson Christopher Sgro. “Regardless, we will present our case to show what every 17-year-old in the world knows: Instagram competes with TikTok (and YouTube and X and many other apps). The FTC spent tens of millions of taxpayer dollars bringing a weak case with a market definition that ignores reality.”

A judgment on partial findings asks a judge to consider a case’s merits before it has been fully argued in court, attempting to speed its resolution. The trial is still currently scheduled to proceed, with Meta launching into its defense against the FTC’s allegations, but the filing offers a preview of its case.

As Meta’s lawyers have done in cross-examination, it takes aim at the agency’s description of Meta monopolizing a “personal social networking services” market that people use to share information with family and friends. It argues that the FTC has failed to demonstrate Meta reduced the quality of its services (a key sign that a company lacks competition) or that it bought Instagram to neutralize a potential rival.

The FTC has made its case with testimony from several high-profile players in Meta’s businesses, including Instagram’s co-founder Kevin Systrom — who aired complaints about Meta’s handling of his company — and its current head, Adam Mosseri, who offered a more optimistic take. Meta has countered by emphasizing the company’s persistent struggles against social networks that the FTC doesn’t consider full competitors, particularly TikTok, which, in the war for those aforementioned 17-year-olds’ attention, Meta portrays as a constant scourge.

Advertisement
Continue Reading

Technology

What hackers can learn about you from a data broker file

Published

on

What hackers can learn about you from a data broker file

Hackers are pretty scary. Amoral, hooded figures with magical computer skills that can break into anything within minutes. 

At least that is what most of us think of when we hear the term “hacker.” It is not exactly a realistic or particularly representative image, but, at the same time, it is not too far off the mark either. 

What many people do not realize is just how much hackers can learn about you from a data broker file, detailed profiles compiled from your personal information collected and sold by data brokers. This hidden industry fuels much of what hackers use to target individuals today.

Join The FREE CyberGuy Report: Get my expert tech tips, critical security alerts, and exclusive deals — plus instant access to my free Ultimate Scam Survival Guide when you sign up!

Illustration of a person’s personal data. (Kurt “CyberGuy” Knutsson)

Advertisement

What is a data broker, and why should you care?

When most people hear the term “data broker,” on the other hand, they draw a blank. Is it a person or company that buys and sells data? Basically, yes. Data brokers collect, sort, analyze, package and sell access to personal information. Whose personal information? Anyone’s and everyone’s, including yours.

THINK YOU CAN DELETE YOUR DATA YOURSELF? HERE’S WHY YOU’RE PROBABLY WRONG

what hackers can learn 2

Illustration of a person’s personal data. (Kurt “CyberGuy” Knutsson)

THINK YOU CAN DELETE YOUR OWN DATA? WHY IT’S HARDER THAN YOU THINK

What kinds of personal information do they deal in?

Here is a list of possible data points you, random companies, your worst enemy, your neighbors and, yes, hackers can find in a data broker file:

  • Full name
  • Past legal names
  • Known aliases
  • Social media handles
  • Gender
  • Sexual preferences
  • Date of birth or age
  • Social Security number (SSN)
  • Current and past home addresses
  • Current and past phone numbers
  • Current, past and secret email addresses
  • Political preferences and affiliations
  • Occupation
  • Current employer
  • Employment history
  • Business associates
  • Education
  • Marital status
  • Marriage and divorce records
  • Family status (number and ages of children)
  • Relatives
  • Property information
  • Vehicle registration
  • Assets
  • Financial information
  • Bankruptcies, judgments and liens
  • Licenses (drivers license, firearms permits, etc.)
  • Court records
  • Criminal records
  • Mugshots
  • Sex-offender status
  • Health history
  • Location data
  • IP information
  • Device information (phone, tablet and computer models)
  • Web browser information
  • Shopping habits
  • Interests and hobbies.

Quite the list, is it not? It is not exhaustive; there is more that data brokers collect and more yet that they and their customers can infer from data points like these. What exactly a given data broker has will depend on which category it falls into.

HACKERS CLAIM MASSIVE BREACH OF COMPANY THAT TRACKS AND SELLS AMERICANS’ LOCATION DATA

Advertisement
what hackers can learn 3

Illustration of a person’s personal data. (Kurt “CyberGuy” Knutsson)

HOW TO GET RID OF ROBOCALLS WITH APPS AND DATA REMOVAL SERVICES

Types of data brokers: Who’s collecting and selling your information?

The most visible data brokers are commonly known as people search sites or people finder sites. These are the sites that show up when you Google yourself, or a hacker Googles you. They are just the tip of the iceberg, though. There are other data brokers that do not bother indexing individual profiles with search engines, preferring instead to deal with other companies and even governments directly. These are the other major types of data brokers, in addition to people search sites:

Marketing data brokers focus more on your browsing habits, past purchases and interests. They are responsible for “personalized marketing” as well as helping other companies target you with those surprisingly relevant ads you see online.

Recruitment data brokers collect and process personal information to offer background screening services to organizations evaluating job candidates or performing background checks before making an offer. Unfortunately, although illegal, there is nothing actually stopping unscrupulous employers from using the much less regulated and reliable people search sites for the same purposes.

Risk mitigation brokers aggregate a variety of background, criminal, property and other information to provide assessment reports to various investment and business companies. The information they collect is aimed at helping such companies manage risk in taking on new business.

Advertisement

Financial information brokers collect various personal finance and background information for credit companies and banks to calculate your credit score and may influence your eligibility to get loans and lines of credit.

Health information data brokers collect information about your general health and sell it to companies in healthcare and related fields. This information can be used to target you with health product ads and even set your insurance premiums.

Hackers are most likely to use people search sites, though; they are easily accessible, eminently searchable, relatively cheap (with trial offers for as little as a dollar) and do not ask any questions. Other data brokers may also sell personal information to hackers, but they tend to sell profiles in bulk.

DATA REMOVAL DOES WHAT VPNS DON’T: HERE’S WHY YOU NEED BOTH

Want your data taken off this market?

It is perfectly normal to want no part in any of this. Unfortunately, there is no federal law on the books in the U.S. that would either prevent this kind of data trade or give you an easy, legally enforced way to opt out.

Advertisement

The good news is that, thanks to an incomplete patchwork of state laws, personal information removal services can approach hundreds of individual data brokers on your behalf with legally binding data-removal requests.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. 

Kurt’s key takeaways

It is easy to feel overwhelmed when you realize just how much of your personal information is out there, and how many different players are collecting, selling and using it. But knowing how data brokers operate is the first step to taking back control. Whether it is people search sites or the less visible brokers working behind the scenes, your data is valuable, and you deserve to know who has it and what they are doing with it. The good news is, there are tools and services out there that can help you clean up your digital footprint and protect your privacy. So, do not just sit back and hope for the best — take action and make your data work for you, not against you.

In your opinion, what should be done to give people more control over their data? Let us know by writing us at Cyberguy.com/Contact

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Advertisement

Copyright 2025 CyberGuy.com. All rights reserved.  

Continue Reading

Technology

Love, Death, and Robots keeps a good thing going in volume 4

Published

on

Love, Death, and Robots keeps a good thing going in volume 4

At its best, Netflix’s Love, Death, and Robots creates the same feeling as picking up a collection of sci-fi short stories. You don’t always know what to expect, and not everything is brilliant, but you’re guaranteed to experience something interesting. That was especially true of volume 3 of the animated anthology, which offered nine shorts, all of which were excellent. The latest volume doesn’t quite hit the same heights, nor does it have a singular standout episode like “The Very Pulse of the Machine,” but it’s still a strong offering.

What volume 4 does do well — and it’s something that’s a strength of LDR as a whole — is offer a wide variety of tones and styles. There are still the dark, violent, and hyperreal episodes that are so closely associated with LDR, like “Spider Rose,” a follow-up to last season’s “Swarm,” which tells a cyberpunk story about a woman consumed with revenge who ends up finding it with the help of a very strange creature. There’s also “The Screaming of the Tyrannosaur,” in which trained warriors fight to the death in front of rich dignitaries and royalty, all while racing on dinosaurs. In a strangely inspired bit of casting, the death races are hosted by MrBeast.

But the show also continues to push beyond classic, darker science fiction. There’s a lot of comedy here, for instance. One episode is a confessional for smart devices like connected toothbrushes and toilets, which complain about how horrible it is to serve humans. Another follows a cat intent on world domination, who finds the perfect accomplice when its owners bring home a robotic assistant. And if you enjoyed last season’s “Night of the Mini Dead,” there’s a sequel that similarly turns an alien invasion into a cutesy diorama of death and destruction.

And while the show still skews heavily toward CG animation, there are a pair of great 2D episodes, as well. “How Zeke Got Religion” is pure Heavy Metal and is a story about a group of WWII soldiers who end up fighting a demonic monstrosity summoned by the Nazis. It’s filled with copious amounts of blood and gore and a truly terrifying monster that’s all hands, mouths, and screams. That’s joined by “400 Boys,” a wild and kinetic post-apocalyptic action story about a world filled with warring gangs that join together to fight a group of towering, naked babies that are simply called “boys.”

Volume 4 takes a few fun risks, as well. “Golgotha” is the show’s first fully live-action short, a simple story about a priest, an alien invasion, and a resurrected dolphin who might be the messiah. Like the best of LDR, the episode is satisfying on its own, but it also leaves you wanting to see and learn much more about its world. Not all the episodes are quite so successful. “For He Can Creep” is a fine-if-forgettable tale of a cat fighting Satan, while “Can’t Stop” is an impressive-looking music video that turns the Red Hot Chili Peppers into marionettes but feels pretty out of place amid the rest of the season (and LDR as a whole).

Advertisement

But even the worst episodes of volume 4 are still interesting, and that’s the promise of Love, Death, and Robots, really. Streaming services have helped usher in a new wave of sci-fi anthologies, which have ranged from prophetic and impactful to completely unnecessary. LDR might be the most consistent modern example of the form. It’s funny, violent, and surprising — and almost never boring.

Volume 4 of Love, Death, and Robots is now streaming on Netflix.

Continue Reading

Trending