Social engineering is a technique used by cybercriminals to manipulate people and obtain confidential information or access to protected systems. It’s what I call the “uncle’s story” of the digital age.
With the increasingly widespread use of artificial intelligence (AI) As a technology for committing crimes, these attacks have evolved allowing fraudsters to create personalized and convincing messages, imitate voices or faces almost perfectly, and launch large-scale attacks with high precision.
The deepfakes They are fake videos, images or audio that look genuine, created using AI. These have been used to impersonate, spread false information or even extort people and companies. When they are used on social networks they reach extraordinary viralization, which generates greater impact and damage.
In recent times, there have been cases of public figures who seem to say or do things that are false, which can have very serious consequences not only for those who receive the messages (generating misinformation or false information) but also for the reputation of the person used. (many times a victim of extortion because of this).
Another very widespread technique is automated phishing. AI makes it possible to personalize phishing emails on a large scale, increasing the likelihood that victims will fall into the trap. While traditional phishing often relies on generic emails sent to a broad audience, AI makes it possible to analyze social media and other public data to create highly targeted messages that increase the credibility of the scam.
Lastly, the chatbots AI-powered devices can impersonate real people on messaging platforms, gaining the trust of victims and obtaining sensitive information, such as account numbers or passwords, or directing them to phishing websites. These bots can pose as customer service representatives, coworkers, or even friends, which is why it’s important to be alert.
Tips or recommendations to avoid falling into deception
First of all, it is essential check the source before trusting any message or content. If something seems suspicious, it is best to contact the person or institution involved directly. It is essential to pay attention to details; Red flags may include grammatical errors, strange URLs, and requests for personal information. And never enter confidential information through links provided in unsolicited emails or messaging platforms.
Before a unusual video or audio from someone you know, especially if it contains urgent requests or unusual behavior, you must verify its authenticity through an alternative means of communication.
On the other hand, it is essential do not share personal information on social networks. Scammers often collect data from here to personalize their attacks.
Many times, it is also necessary doubt what is too good to be truesuch as offers, prizes or unexpected messages that seem very tempting. It is always preferable to maintain a skeptical attitude.
Also, it is essential to have activated the two-step authentication on all active accounts, to add an extra layer of security.
Last, but not least, is the user educationkey to being protected. From the moment we use the Internet and technological devices, it is essential to know the risks to which we are exposed, and to use them responsibly.
Therefore, even knowing the new trends that come with the use of artificial intelligence is a good way to prevent future attacks or deception.
Engineer (MP 2411 – MN 5117) – Forensic Computer Expert, Security Specialist – Partner of the CySI Computer Forensic Study
Source: Ambito
David William is a talented author who has made a name for himself in the world of writing. He is a professional author who writes on a wide range of topics, from general interest to opinion news. David is currently working as a writer at 24 hours worlds where he brings his unique perspective and in-depth research to his articles, making them both informative and engaging.