{"id":2142,"date":"2019-09-23T13:26:27","date_gmt":"2019-09-23T13:26:27","guid":{"rendered":"https:\/\/www.technology-solved.com\/huntsville-al\/?p=2142"},"modified":"2020-09-14T13:55:36","modified_gmt":"2020-09-14T13:55:36","slug":"hackers-use-fake-voices","status":"publish","type":"post","link":"https:\/\/www.technology-solved.com\/huntsville-al\/hackers-use-fake-voices\/","title":{"rendered":"Hackers Can Now Use Fake Voices To Steal Money"},"content":{"rendered":"<p>You&#8217;ve almost certainly been seeing stories on the internet this year about the growing trend of Deep Fakes.<\/p>\n<p>They are videos that are expertly engineered to give the appearance of some prominent figure or another saying something that he or she never actually said.<\/p>\n<p>It&#8217;s a clever, computer generated ruse.<\/p>\n<p>The reason it&#8217;s been making headlines is that Deep Fakes tend to be really good, which makes them notoriously difficult to spot. Their recent appearance, unfortunately, is negatively impacting the national dialogue on important issues. After all, when you&#8217;re looking at what appears to be evidence of a prominent figure saying something shocking, of course you&#8217;re going to be inclined to believe your own eyes.<\/p>\n<p>Naturally, it did not take the hackers of the world long to figure out a way to use this relatively new technology to their benefit. Recently, a UK energy company&#8217;s CEO was tricked into wiring more than $220,000 USD to a Hungarian supplier. He believed that he had received verbal instructions from his boss to do exactly that, and merely complied with the order.<\/p>\n<p>The only problem? His boss issued no such order. It actually came from a hacker using deep fake software to precisely mimic the voice of the executive demanding that his underling pays the supplier within the hour.<\/p>\n<p>A spokesman for the company&#8217;s insurance firm had this to say about the matter:<\/p>\n<p>&#8220;The software was able to imitate the voice, and not only the voice: the tonality, the punctuation, the German accent.&#8221;<\/p>\n<p>Energy company employees caught onto the ruse when the hacker made a similar demand a short time later that same day. The second time though, the energy firm CEO called his boss personally, only to discover that he was simultaneously dealing with his fake boss and the real one.<\/p>\n<p>There&#8217;s no way to know how many times this has happened before, or how frequently it&#8217;s happening now. Even worse, our ability to create deep fakes presently far outstrips our ability to detect them. That should give business owners everywhere pause.<\/p>\n<p>Used with permission from <a href=\"https:\/\/sitesdev.net\/articles\/wp-login.php?redirect_to=https%3A%2F%2Fsitesdev.net%2Farticles%2F2019%2F09%2F10%2Fanother-irs-phishing-campaign-to-watch-out-for%2F&amp;reauth=1\" target=\"_blank\" rel=\"noopener noreferrer\">Article Aggregator<\/a>.<\/p>\n<p>If you would like more info, please contact <a href=\"https:\/\/www.technology-solved.com\/huntsville-al\/contact-us\/\" target=\"_blank\" rel=\"noopener noreferrer\">Computer Troubleshooters Huntsville<\/a> today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You&#8217;ve almost certainly been seeing stories on the internet this year about the growing trend of Deep Fakes. They are videos that are expertly engineered to give the appearance of some prominent figure or another saying something that he or she never actually said. It&#8217;s a clever, computer generated ruse. The reason it&#8217;s been making [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-2142","post","type-post","status-publish","format-standard","hentry","category-general"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Deep Fakes: Hackers Use Fake Voices to Steal Money<\/title>\n<meta name=\"description\" content=\"You&#039;ve almost certainly been seeing stories on the internet this year about the growing trend of Deep Fakes. They are videos that are expertly engineered\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deep Fakes: Hackers Use Fake Voices to Steal Money\" \/>\n<meta property=\"og:description\" content=\"You&#039;ve almost certainly been seeing stories on the internet this year about the growing trend of Deep Fakes. They are videos that are expertly engineered\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.technology-solved.com\/huntsville-al\/hackers-use-fake-voices\/\" \/>\n<meta property=\"og:site_name\" content=\"Computer Troubleshooters Huntsville\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-23T13:26:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-14T13:55:36+00:00\" \/>\n<meta name=\"author\" content=\"cthuntsville\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cthuntsville\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/hackers-use-fake-voices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/hackers-use-fake-voices\\\/\"},\"author\":{\"name\":\"cthuntsville\",\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/#\\\/schema\\\/person\\\/1141e403df8721a619d7e354767b4e90\"},\"headline\":\"Hackers Can Now Use Fake Voices To Steal Money\",\"datePublished\":\"2019-09-23T13:26:27+00:00\",\"dateModified\":\"2020-09-14T13:55:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/hackers-use-fake-voices\\\/\"},\"wordCount\":375,\"commentCount\":0,\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/hackers-use-fake-voices\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/hackers-use-fake-voices\\\/\",\"url\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/hackers-use-fake-voices\\\/\",\"name\":\"Deep Fakes: Hackers Use Fake Voices to Steal Money\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/#website\"},\"datePublished\":\"2019-09-23T13:26:27+00:00\",\"dateModified\":\"2020-09-14T13:55:36+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/#\\\/schema\\\/person\\\/1141e403df8721a619d7e354767b4e90\"},\"description\":\"You've almost certainly been seeing stories on the internet this year about the growing trend of Deep Fakes. They are videos that are expertly engineered\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/hackers-use-fake-voices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/hackers-use-fake-voices\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/hackers-use-fake-voices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Locations\",\"item\":\"https:\\\/\\\/www.technology-solved.com\\\/locations\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alabama\",\"item\":\"https:\\\/\\\/www.technology-solved.com\\\/alabama-state\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Homepage\",\"item\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Hackers Can Now Use Fake Voices To Steal Money\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/#website\",\"url\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/\",\"name\":\"Computer Troubleshooters Huntsville\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/#\\\/schema\\\/person\\\/1141e403df8721a619d7e354767b4e90\",\"name\":\"cthuntsville\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g\",\"caption\":\"cthuntsville\"},\"url\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/author\\\/cthuntsville\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deep Fakes: Hackers Use Fake Voices to Steal Money","description":"You've almost certainly been seeing stories on the internet this year about the growing trend of Deep Fakes. They are videos that are expertly engineered","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Deep Fakes: Hackers Use Fake Voices to Steal Money","og_description":"You've almost certainly been seeing stories on the internet this year about the growing trend of Deep Fakes. They are videos that are expertly engineered","og_url":"https:\/\/www.technology-solved.com\/huntsville-al\/hackers-use-fake-voices\/","og_site_name":"Computer Troubleshooters Huntsville","article_published_time":"2019-09-23T13:26:27+00:00","article_modified_time":"2020-09-14T13:55:36+00:00","author":"cthuntsville","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cthuntsville","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/hackers-use-fake-voices\/#article","isPartOf":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/hackers-use-fake-voices\/"},"author":{"name":"cthuntsville","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/1141e403df8721a619d7e354767b4e90"},"headline":"Hackers Can Now Use Fake Voices To Steal Money","datePublished":"2019-09-23T13:26:27+00:00","dateModified":"2020-09-14T13:55:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/hackers-use-fake-voices\/"},"wordCount":375,"commentCount":0,"articleSection":["General"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.technology-solved.com\/huntsville-al\/hackers-use-fake-voices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/hackers-use-fake-voices\/","url":"https:\/\/www.technology-solved.com\/huntsville-al\/hackers-use-fake-voices\/","name":"Deep Fakes: Hackers Use Fake Voices to Steal Money","isPartOf":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#website"},"datePublished":"2019-09-23T13:26:27+00:00","dateModified":"2020-09-14T13:55:36+00:00","author":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/1141e403df8721a619d7e354767b4e90"},"description":"You've almost certainly been seeing stories on the internet this year about the growing trend of Deep Fakes. They are videos that are expertly engineered","breadcrumb":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/hackers-use-fake-voices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.technology-solved.com\/huntsville-al\/hackers-use-fake-voices\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/hackers-use-fake-voices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Locations","item":"https:\/\/www.technology-solved.com\/locations\/"},{"@type":"ListItem","position":2,"name":"Alabama","item":"https:\/\/www.technology-solved.com\/alabama-state\/"},{"@type":"ListItem","position":3,"name":"Homepage","item":"https:\/\/www.technology-solved.com\/huntsville-al\/"},{"@type":"ListItem","position":4,"name":"Hackers Can Now Use Fake Voices To Steal Money"}]},{"@type":"WebSite","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#website","url":"https:\/\/www.technology-solved.com\/huntsville-al\/","name":"Computer Troubleshooters Huntsville","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.technology-solved.com\/huntsville-al\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/1141e403df8721a619d7e354767b4e90","name":"cthuntsville","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g","caption":"cthuntsville"},"url":"https:\/\/www.technology-solved.com\/huntsville-al\/author\/cthuntsville\/"}]}},"_links":{"self":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts\/2142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/comments?post=2142"}],"version-history":[{"count":2,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts\/2142\/revisions"}],"predecessor-version":[{"id":2144,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts\/2142\/revisions\/2144"}],"wp:attachment":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/media?parent=2142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/categories?post=2142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/tags?post=2142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}