Table of Contents
1. Be the first person responsible for personal information security
2. Remote transfers must require multiple verifications and keep the "money bag" secure
Home Technology peripherals AI Be wary of the new 'AI face-changing' scam, the Internet Society of China gives prevention suggestions

Be wary of the new 'AI face-changing' scam, the Internet Society of China gives prevention suggestions

May 29, 2023 am 12:00 AM
ai

警惕“AI 换脸”新骗局,中国互联网协会给出防范建议

According to news on May 24, the Internet Society of China’s WeChat public account issued an article today, reminding netizens to be wary of the new “AI face-changing” scam.

IT House previously reported that recently, the Telecommunications Network Crime Investigation Bureau of Baotou City Public Security Bureau released a case of using intelligent AI technology to commit telecommunications network fraud. Criminals use AI technology to forge the voice of a specific person through voice synthesis, use AI to change faces, disguise themselves as a specific person, and conduct video calls with others in real time. By changing facial expressions to look natural, pretending to be someone else to contact the victim, gain their trust, and ultimately commit fraud.

The Internet Society of China stated that in the face of new scams using AI technology, the general public needs to be more vigilant and strengthen prevention.

In response to the new "AI face-changing" scam, the Internet Society of China puts forward the following two prevention suggestions:

1. Be the first person responsible for personal information security

1. Strengthen the awareness of personal information protection and prevent information leakage: do not easily provide your face, fingerprints and other personal biometric information to others; do not easily disclose your ID card, bank card, verification code and other information; do not take photos of your ID card or bank card for convenience etc. are directly stored together in the mobile phone.

Tips: If you find that the App excessively or compulsorily collects personal information, please go to 12321.cn to make a complaint.

Do not click on unfamiliar links, download unfamiliar software, add unfamiliar friends or scan unknown QR codes. Manage your circle of friends well, and don’t easily share your phone screen with strangers.

3. Take personal protection and install security software to prevent viruses on mobile phones and computers. Stay vigilant about the security of personal accounts, especially logins from unfamiliar devices, to prevent WeChat, QQ, etc. from being hacked and causing trouble to relatives and friends.

4. For apps that are not commonly used, it is recommended to log out of your personal account before uninstalling them.

Tips: If the App does not provide a way to log out a personal account, or sets up various obstacles for logging out an account, please go to 12321.cn to complain.

2. Remote transfers must require multiple verifications and keep the "money bag" secure

If someone claims to be "family", "friend", "teacher" or "leader" through social software, text messages, or emails Waiting for example: "My mobile phone fell into the water, and the school needs to pay the remedial class tuition urgently" "I am traveling abroad and need help buying air tickets" "I need to transfer money urgently to handle personal matters for the leader" "I encountered a car accident and need immediate surgery" "Special circumstances, There are various ways and reasons to induce you to transfer money, such as "bridging funds are needed", so be sure to be vigilant as soon as possible!

In the AI ​​era, text, sound, images and videos may all be deeply synthesized. In typical scenarios such as transfers, remittances, and capital exchanges, you must verify and confirm through additional communication methods such as calling back the other party's mobile phone number. Do not transfer money directly without verification based on a single communication channel! No matter who the other party is!

Tips: If you encounter fraud information, please report it to the anti-fraud column of 12321.cn. If you suffer any loss of funds, please call the police in time.

The above is the detailed content of Be wary of the new 'AI face-changing' scam, the Internet Society of China gives prevention suggestions. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
Two Point Museum: All Exhibits And Where To Find Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to output a countdown in C language How to output a countdown in C language Apr 04, 2025 am 08:54 AM

How to output a countdown in C? Answer: Use loop statements. Steps: 1. Define the variable n and store the countdown number to output; 2. Use the while loop to continuously print n until n is less than 1; 3. In the loop body, print out the value of n; 4. At the end of the loop, subtract n by 1 to output the next smaller reciprocal.

What are the pointer parameters in the parentheses of the C language function? What are the pointer parameters in the parentheses of the C language function? Apr 03, 2025 pm 11:48 PM

The pointer parameters of C language function directly operate the memory area passed by the caller, including pointers to integers, strings, or structures. When using pointer parameters, you need to be careful to modify the memory pointed to by the pointer to avoid errors or memory problems. For double pointers to strings, modifying the pointer itself will lead to pointing to new strings, and memory management needs to be paid attention to. When handling pointer parameters to structures or arrays, you need to carefully check the pointer type and boundaries to avoid out-of-bounds access.

What are the rules for function definition and call in C language? What are the rules for function definition and call in C language? Apr 03, 2025 pm 11:57 PM

A C language function consists of a parameter list, function body, return value type and function name. When a function is called, the parameters are copied to the function through the value transfer mechanism, and will not affect external variables. Pointer passes directly to the memory address, modifying the pointer will affect external variables. Function prototype declaration is used to inform the compiler of function signatures to avoid compilation errors. Stack space is used to store function local variables and parameters. Too much recursion or too much space can cause stack overflow.

How to define the call declaration format of c language function How to define the call declaration format of c language function Apr 04, 2025 am 06:03 AM

C language functions include definitions, calls and declarations. Function definition specifies function name, parameters and return type, function body implements functions; function calls execute functions and provide parameters; function declarations inform the compiler of function type. Value pass is used for parameter pass, pay attention to the return type, maintain a consistent code style, and handle errors in functions. Mastering this knowledge can help write elegant, robust C code.

CS-Week 3 CS-Week 3 Apr 04, 2025 am 06:06 AM

Algorithms are the set of instructions to solve problems, and their execution speed and memory usage vary. In programming, many algorithms are based on data search and sorting. This article will introduce several data retrieval and sorting algorithms. Linear search assumes that there is an array [20,500,10,5,100,1,50] and needs to find the number 50. The linear search algorithm checks each element in the array one by one until the target value is found or the complete array is traversed. The algorithm flowchart is as follows: The pseudo-code for linear search is as follows: Check each element: If the target value is found: Return true Return false C language implementation: #include#includeintmain(void){i

Integers in C: a little history Integers in C: a little history Apr 04, 2025 am 06:09 AM

Integers are the most basic data type in programming and can be regarded as the cornerstone of programming. The job of a programmer is to give these numbers meanings. No matter how complex the software is, it ultimately comes down to integer operations, because the processor only understands integers. To represent negative numbers, we introduced two's complement; to represent decimal numbers, we created scientific notation, so there are floating-point numbers. But in the final analysis, everything is still inseparable from 0 and 1. A brief history of integers In C, int is almost the default type. Although the compiler may issue a warning, in many cases you can still write code like this: main(void){return0;} From a technical point of view, this is equivalent to the following code: intmain(void){return0;}

Zustand asynchronous operation: How to ensure the latest state obtained by useStore? Zustand asynchronous operation: How to ensure the latest state obtained by useStore? Apr 04, 2025 pm 02:09 PM

Data update problems in zustand asynchronous operations. When using the zustand state management library, you often encounter the problem of data updates that cause asynchronous operations to be untimely. �...

How to implement nesting effect of text annotations in Quill editor? How to implement nesting effect of text annotations in Quill editor? Apr 04, 2025 pm 05:21 PM

A solution to implement text annotation nesting in Quill Editor. When using Quill Editor for text annotation, we often need to use the Quill Editor to...

See all articles