Threat to WhatsApp users: Beware!

In today’s widespread use of the Internet, the increased popularity of artificial intelligence causes new fraud methods to emerge. With a new technique developed by fraudsters, WhatsApp users are defrauded before they have a chance to understand what is going on. Cyber ​​security experts warned about the issue. Here are the details

WhatsApp scammers look like people you know using artificial intelligence

In fact, the new generation fraud method followed by scammers is quite similar to traditional methods. Thanks to a technology called deepfake, scammers look for you by imitating the voices of your acquaintances and pass on details about the people around you in order to gain your trust. After gaining your trust, they aim to abuse your goodwill by asking for a loan from you like an acquaintance.

Although this method is based on a simple logic, it seems that people have started to take effect. Finally, a WhatsApp user living in India fell into the network of fraudsters by answering a call that he thought he received from a former colleague. The user who trusts the call because he remembers his voice and mentions his mutual friends, 40 thousand rupees transferred the amount to the account forwarded to him. Despite transferring the amount to the account, the victim, who did not suspect, asked the other party for money again, and after realizing the situation, the matter was moved to the law enforcement authorities.

Windows detail in Russia-Ukraine cyber war!

Windows detail in Russia-Ukraine cyber war!

As the Russia-Ukraine war continues, Russian hackers used Windows updates in their latest attack.

In line with the investigations made by the law enforcement officers, the true face of the issue was fully understood. Although the aforementioned grievance could not be resolved, experts warned that other internet users should not be victims.

So, what do you think about this fraud method? Have you faced a similar situation before? You can share your views and experiences with us in the comments section.

source site-28