Skip to content
logo TYM
  • TYMExpand
    • The Company
    • Work with Us
    • Contact
  • SERVICESExpand
    • Consulting
    • Operation
    • Outsourcing
    • Technology
  • SOLUTIONSExpand
    • Enterprise initiatives and Activities Management
    • Strategic Planning
    • Corporate Evaluation System
    • Organizations Economic Management
    • Customers and Affiliates Management
    • Endorsment Management
    • Event Management
    • Voting Management
    • Transparency Management
    • Mobile Services Platform
    • Document Consolidation
    • Applications Portal
  • SECTORS
  • NEWS
  • EnglishExpand
    • Spanish
logo TYM
Internet | Trends

AI, deepfakes and scams

Bytym 06/02/202406/02/2024
We recently read in the news that the next level has been reached with deepfakes and scams. Deepfakes use learning algorithms to analyze and synthesize human’s gestures, facial expressions and lip movements and then apply them to another person in a manipulated video.

Imagine a video call where your boss asks you to transfer millions? Well, that has happened to a multinational company based in the United Kingdom. It has been scammed out of $26 million when its employees in Hong Kong made transfers believing they were on a video call with the executive board. Scammers used deepfake by collecting images and audios from social networks to simulate a video conference with managers. The employees, despite being surprised by the request, recognized the faces and voices of their superiors and made the transfer. It was not until days later that they realized the fraud and reported the facts to the police.
deepfakes y las estafas

A constantly changing Digital World

In this frenetic digital world in constant transformation, the emergence of technologies such as deepfakes or artificial intelligence presents increasingly important challenges in terms of security. The ability to create fake content in a convincing way reaches new levels every day, requiring users to be always alert. Rapid evolution of these technological tools highlights the importance of staying well informed and adopting safeguards against any doubts about information authenticity.

Calls and messaging scams

Another potential source of scams and AI are phone calls. They are designed to generate calls that seem authentic. In addition, thanks to the cloning of voices through artificial intelligence systems, users are also beginning to receive calls that simulate almost perfectly the voice of their relatives in an attempt to obtain transfers or private data. We give you some key tips to differentiate any suspicious call:

Suspicious Prefixes: Some countries have telephone prefixes commonly associated with scams. For example, the +212 prefix in Morocco or the +967 prefix in Yemen have been linked to a significant number of telephone frauds. Be alert to these indicators if you do not expect to receive calls from other countries.

Calls from institutions: Always be cautious of calls from entities that argue system failures to request personal data, passwords, or request transfers to accounts for whatever reason. Hang up the phone and verify the situation by calling the entity directly.

Calls from relatives in trouble: If we receive calls from people close to us through hidden numbers, asking for help or in extreme situations that can only be solved through private data or transfers, we should be suspicious.

Filtering Tools: On both Android and iOS, there are different built-in tools to detect and block spam calls automatically. Enable these options to get an extra layer of protection.

Finally, if a family member or friend writes to say that they need a money transfer urgently, it is probably a scam. t will be enough to call that person and always verify the authenticity of the messages. We should also avoid sharing any type of code via messaging that could compromise the security of our accounts.

At the moment, given the increase and diversity of new scams, it is clear that our best weapon is to keep ourselves informed and protected. And if you still need extra help with cybersecurity, do not hesitate to contact Tym.

Post navigation

Previous Previous
Wifi 7: New features and specifications
NextContinue
5 Tips to improve memory and mental agility

TYM · SERVICES · SOLUTIONS · SECTORS · NEWS · CONTACT

tym 25 años
©2025 TYM. All Rights Reserved
(+34) 91 372 83 21
info@tym.es
C/ Poeta Joan Maragall 23
28020 Madrid
X Linkedin Email Instagram
Fondos europeos


ISO 27001 – INFORMATION SECURITY POLICY

Legal Notice · Privacy Policy · Cookies Policy

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in .

Scroll to top
  • TYM
    • The Company
    • Work with Us
    • Contact
  • SERVICES
    • Consulting
    • Operation
    • Outsourcing
    • Technology
  • SOLUTIONS
    • Enterprise initiatives and Activities Management
    • Strategic Planning
    • Corporate Evaluation System
    • Organizations Economic Management
    • Customers and Affiliates Management
    • Endorsment Management
    • Event Management
    • Voting Management
    • Transparency Management
    • Mobile Services Platform
    • Document Consolidation
    • Applications Portal
  • SECTORS
  • NEWS
  • English
    • Spanish
Privacy Overview
TYM

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

Third-party Cookies

More information about our Cookies Policy

Please enable Strictly Necessary Cookies first so that we can save your preferences!

Powered by  GDPR Cookie Compliance