Meta pulls back its new AI speech tool

Meta, the company behind the AI speech tool called Voicebox, has announced a delay in its release due to concerns about the potential risks of misuse. While Voicebox has the capability to generate realistic speech resembling the voice of a person from a source clip, it also poses a threat in terms of enabling the creation of deceptive “deepfake” dialogue.

The increasing accessibility of AI tools has made it easier for scammers to engage in cybercrime. One type of scam, known as voice cloning, has gained traction in the United States. Voice cloning tools are readily available online, often for free, allowing fraudsters to leave misleading voicemails and alter their voices during phone calls. The objective of this scam is to deceive individuals by impersonating their family members.

A recent survey revealed that 70 percent of respondents expressed uncertainty about their ability to distinguish between a cloned voice and a real one, highlighting the potential for successful deception.

Perpetrating a crime using such technology is relatively simple. Scammers only require a short audio clip of a person’s voice, which can be easily obtained from content posted online. By utilizing a voice-cloning program, scammers can create convincing calls that mimic the voices of loved ones. As this form of cybercrime becomes more prevalent, individuals must exercise increased vigilance and take appropriate safety measures when receiving calls from unknown numbers.

In addition to voice scams, there are other risks associated with AI-generated voice impersonation. When suspicions arise regarding someone impersonating a caller, it is advisable to hang up and call back the person’s genuine phone number. Contacting the person through social media can help verify the authenticity of the call. If the individual has no recollection of calling, it is important to decline any further phone calls. Currently, victims are often targeted using unknown numbers, so it is recommended to avoid answering calls from unfamiliar sources.

To minimize the chances of falling victim to such scams, it is wise to refrain from posting phone numbers online or on social media platforms. Moreover, as these scams continue to proliferate, establishing a unique “safeword” with trusted individuals can help differentiate genuine emergencies from fraudulent attempts.

Posted in

Infotech Hub

Leave a Comment





MacBook Pro with images of computer language codes

Emerging Trends in Artificial Intelligence

a room filled with lots of metal chairs

The Future of the Infotech Industry in 2024

IT companies see shift in deal scope on GenAI, muted market

IT Companies Adapt to GenAI Opportunities Amid Market Slowdown

SatCo Makes First 5G Call via Satellite Using Everyday Smartphone

SatCo Makes First 5G Call via Satellite Using Everyday Smartphone

Unlocking Success: The Crucial Role of Lead Generation for IT Companies

Doogee V30T Smartphone: A Rugged Masterpiece With Carrier Caveats

Doogee V30T Smartphone: A Rugged Masterpiece With Carrier Caveats

The Realities of Switching to a Passwordless Computing Future

The Realities of Switching to a Passwordless Computing Future

The Intersection of Marketing and Technology: Exploring the Future of Digital Strategies

Boost Your Sales Pipeline: Discover the Best Lead Generation Software

Sci­en­tists develop fermionic quan­tum pro­ces­sor

Sci­en­tists develop fermionic quan­tum pro­ces­sor

More Linux Malware Means More Linux Monitoring

More Linux Malware Means More Linux Monitoring

Tech Tools for Writers

Tech Tools for Writers

Infotech Hub Today: Empowering the IT Community through Cutting-Edge Publishing

Interview with Mr.Cameron Chehreh

Interview with Mr.Cameron Chehreh

Interview with Mrs.Linda Visnick

Interview with Mrs.Linda Visnick

Tim Bernes-Lee

Interview with Mr.Tim Bernes-Lee

Interview with Mr.Brian Weaver

Interview with Mr.Brian Weaver

Tech Tips & Strategies.

Tech Tips & Strategies.

Tech Product Reviews.

Tech Product Reviews.

Engineers grow full wafers of high-performing 2D semiconductor that integrates with state-of-the-art chips

Engineers grow full wafers of high-performing 2D semiconductor that integrates with state-of-the-art chips

Cyber Insurance Costs Rising, Coverages Shrinking: Report

Cyber Insurance Costs Rising, Coverages Shrinking: Report

Scientists Reveal the Secrets Behind Record-Breaking Tandem Solar Cell

Scientists Reveal the Secrets Behind Record-Breaking Tandem Solar Cell

The Enchilada Trap: New Device Paves the Way for Bigger and Better Quantum Computers

The Enchilada Trap: New Device Paves the Way for Bigger and Better Quantum Computers

Magnonic computing: Faster spin waves could make novel computing systems possible

Magnonic computing: Faster spin waves could make novel computing systems possible

Quantum physicists simulate super diffusion on a quantum computer

Quantum physicists simulate super diffusion on a quantum computer

Research group detects a quantum entanglement wave for the first time using real-space measurements

Research group detects a quantum entanglement wave for the first time using real-space measurements

Switching 'spin' on and off (and up and down) in quantum materials at room temperature

Switching ‘spin’ on and off (and up and down) in quantum materials at room temperature

Advancements in Biometric Authentication Systems

Advancements in Biometric Authentication Systems

AI-Driven Personalized Medicine: A Breakthrough in Healthcare

AI-Driven Personalized Medicine: A Breakthrough in Healthcare

Cloud Robotics: Bridging the Gap Between Robots and the Cloud

Cloud Robotics: Bridging the Gap Between Robots and the Cloud