{"id":12124,"date":"2026-02-24T14:11:46","date_gmt":"2026-02-24T14:11:46","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=12124"},"modified":"2026-02-24T14:11:46","modified_gmt":"2026-02-24T14:11:46","slug":"easy-methods-to-inform-if-a-voice-name-is-ai-or-not","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=12124","title":{"rendered":"Easy methods to inform if a voice name is AI or not"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"sub-title\">Are you able to imagine your ears? More and more, the reply isn&#8217;t any. Right here\u2019s what\u2019s at stake for your online business, and tips on how to beat the deepfakers.<\/p>\n<div class=\"article-authors d-flex flex-wrap\">\n<div class=\"article-author d-flex\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/our-experts\/phil-muncaster\/\" title=\"Phil Muncaster\"><picture><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2021\/04\/Phil_Muncaster.jpg\" media=\"(max-width: 768px)\"\/><img decoding=\"async\" class=\"author-image me-3\" src=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2021\/04\/Phil_Muncaster.jpg\" alt=\"Phil Muncaster\"\/><\/picture><\/a><\/div>\n<\/div>\n<p class=\"article-info mb-5\">\n        <span>23 Feb 2026<\/span><br \/>\n        <span class=\"d-none d-lg-inline\">\u00a0\u2022\u00a0<\/span><br \/>\n        <span class=\"d-inline d-lg-none\">, <\/span><br \/>\n        <span>4 min. learn<\/span>\n    <\/p>\n<div class=\"hero-image-container\">\n        <picture><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x266\/wls\/2026\/02-26\/deepfake-calls-voice-cloning.png\" media=\"(max-width: 768px)\"\/><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x425\/wls\/2026\/02-26\/deepfake-calls-voice-cloning.png\" media=\"(max-width: 1120px)\"\/><img decoding=\"async\" class=\"hero-image\" src=\"https:\/\/web-assets.esetstatic.com\/tn\/-x700\/wls\/2026\/02-26\/deepfake-calls-voice-cloning.png\" alt=\"Faking it on the phone: How to tell if a voice call is AI or not\"\/><\/picture>    <\/div>\n<\/div>\n<div>\n<p>There was a time once we may imagine all the things we noticed and heard. Sadly, these days are most likely lengthy gone. Generative AI (GenAI) has democratized the creation of deepfake audio and video, to the purpose the place producing a fabricated clip is as straightforward as pushing a button or two. That is dangerous information for everybody, together with companies.<\/p>\n<p>Deepfakes are serving to scammers bypass Know Your Buyer and account authentication checks. They will even allow malicious state actors to <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/business-security\/recruitment-spot-spy-job-seeker\/\">masquerade as job candidates<\/a>. However arguably the largest risk they pose is monetary\/wire switch fraud and the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/cybercrime\/the-grand-theft-of-jake-moores-voice-the-concept-of-a-virtual-kidnap\/\">hijacking of govt accounts<\/a>.<\/p>\n<p>Organizations underestimate the deepfake risk at their peril. The <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.gov.uk\/government\/news\/government-leads-global-fight-against-deepfake-threats\">British authorities claims<\/a> that as many as eight million artificial clips have been shared final 12 months, up from simply 500,000 in 2023.\u00a0The actual determine could also be far increased.<\/p>\n<h2>How assaults work<\/h2>\n<p>As <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/cybersecurity\/your-voice-is-my-password\/\">an experiment<\/a> by ESET World Safety Advisor Jake Moore has additionally proven, it\u2019s by no means been simpler to launch a deepfake audio assault on your online business. All it requires is a brief clip of the sufferer to be impersonated. GenAI will do the remaining. Right here\u2019s how an assault may proceed:<\/p>\n<ol>\n<li>An attacker selects the individual they\u2019re going to impersonate. It may be a CEO, a CFO or perhaps a provider.<\/li>\n<li>They discover an audio pattern on-line \u2013 which is sort of straightforward for high-profile executives who commonly communicate in public. It&#8217;d come from a social media account, an earnings name, a video\/TV interview or any variety of different sources. A number of seconds of footage must be sufficient.<\/li>\n<li>They choose the individual to name. This may require some desk analysis \u2013 often scouring LinkedIn for IT helpdesk employees, or finance staff members.<\/li>\n<li>They may name the person direct, or ship an e mail upfront \u2013 for instance, a CEO requesting an pressing cash switch, a password\/multi-factor authentication (MFA) reset request, or a provider demanding cost for an overdue bill.<\/li>\n<li>They name the pre-selected goal, utilizing GenAI-generated deepfake audio to impersonate the CEO\/provider. Relying on the instrument, they might keep on with pre-scripted speech, or use a extra subtle \u201cspeech-to-speech\u201d methodology the place the attacker\u2019s voice is translated in close to actual time to that of their sufferer.<\/li>\n<\/ol>\n<h2>Listening to is believing<\/h2>\n<p>The sort of assault is getting cheaper, simpler and extra convincing. Some instruments are even capable of insert background noise, pauses and stammers to make the impersonated voice sound extra plausible. They\u2019re getting a lot better at mimicking the rhythms, inflection and verbal ticks distinctive to each speaker. And when an assault is launched over the telephone, AI-related glitches could also be more durable for the listener to select up.<\/p>\n<p>Attackers may additionally use social engineering ways, reminiscent of creating stress on the listener to reply urgently to their request, to be able to obtain their targets. One other basic is to induce the listener to maintain the request confidential. Add to that the truth that they\u2019re typically impersonating a senior govt, and it\u2019s straightforward to see why some victims are duped. Who would need to get into the CEO\u2019s dangerous books?<\/p>\n<p>That mentioned, there are methods so that you can spot a faker. Relying on how subtle the GenAI they\u2019re utilizing is, it could be attainable to discern:<\/p>\n<ul>\n<li>An unnatural rhythm to the speech of the speaker<\/li>\n<li>An unnaturally flat emotional tone to the voice of the speaker<\/li>\n<li>Unnatural respiratory and even breath-free sentences<\/li>\n<li>An unusually robotic sound (after they use much less superior tooling)<\/li>\n<li>Background noise which is both surprisingly absent or too uniform<\/li>\n<\/ul>\n<h2>Time to struggle again<\/h2>\n<p>The rationale risk actors are placing extra of their time into scams like these is easy: the potential rewards on provide. Cautionary tales are steadily accumulating. One of many largest blunders got here manner again in 2020, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/deepfake-audio-scores-35-million-in-corporate-heist\">when an worker<\/a> at a agency within the UAE was tricked into believing that their director had phoned to request a $35m fund switch for an M&amp;A deal.<\/p>\n<p>Provided that deepfake know-how has improved considerably within the six years since, it\u2019s value revisiting some key steps you possibly can take to attenuate the probabilities of a worst-case state of affairs.<\/p>\n<p>It ought to begin with worker coaching and consciousness. These applications must be up to date to incorporate deepfake audio simulations to make sure employees identified what to anticipate, what\u2019s at stake and tips on how to act. They need to be taught to identify the tell-tale indicators of social engineering and typical deepfake situations reminiscent of those described above. Crimson teaming workouts must be run to check how properly staff are absorbing this info.<\/p>\n<p>Subsequent comes course of. Think about the next:<\/p>\n<ul>\n<li>Out-of-band verification of any phone-based requests \u2013 i.e., utilizing company messaging accounts to examine with the sender independently<\/li>\n<li>Two people to log off any giant monetary transfers or modifications to provider financial institution particulars<\/li>\n<li>Pre-agreed passphrases or questions which executives should reply to show they&#8217;re who they are saying they&#8217;re over the telephone<\/li>\n<\/ul>\n<p>Expertise can even assist. Detection instruments exist to examine numerous parameters for the presence of an artificial voice. Tougher to implement however one other plan of action could be to restrict the alternatives for risk actors to pay money for audio, by limiting executives\u2019 public appearances.<\/p>\n<h2>Folks, course of and know-how<\/h2>\n<p>Nevertheless, the underside line is that deepfakes are easy and value little to provide. Given the possibly enormous sums up for grabs for the fraudsters, it\u2019s unlikely that we\u2019ll see the tip of voice cloning scams any time quickly. A 3-pronged strategy primarily based round individuals, course of and know-how is due to this fact the best choice your group has to mitigate the chance.<\/p>\n<p>As soon as a plan has been accepted, keep in mind to commonly evaluate it in order that it stays match for goal, whilst AI innovation advances. The brand new <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/cybersecurity\/ai-driven-deception-new-face-corporate-fraud\/\">cyber-fraud panorama<\/a> calls for fixed consideration.<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Are you able to imagine your ears? More and more, the reply isn&#8217;t any. Right here\u2019s what\u2019s at stake for your online business, and tips on how to beat the deepfakers. 23 Feb 2026 \u00a0\u2022\u00a0 , 4 min. learn There was a time once we may imagine all the things we noticed and heard. Sadly, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":12126,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[2323,2571],"class_list":["post-12124","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-call","tag-voice"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12124"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12124\/revisions"}],"predecessor-version":[{"id":12125,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12124\/revisions\/12125"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/12126"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-11 00:34:09 UTC -->