{"id":33308,"date":"2025-04-17T11:01:49","date_gmt":"2025-04-17T03:01:49","guid":{"rendered":"https:\/\/www.1ai.net\/?p=33308"},"modified":"2025-04-17T11:01:49","modified_gmt":"2025-04-17T03:01:49","slug":"%e5%be%ae%e8%bd%af%e6%9c%80%e6%96%b0%e6%8a%a5%e5%91%8a%e6%95%99%e4%bd%a0%e9%98%b2%e8%af%88%ef%bc%9a%e5%a6%82%e4%bd%95%e9%81%bf%e5%bc%80-ai-%e7%94%9f%e6%88%90%e7%9a%84%e8%99%9a","status":"publish","type":"post","link":"https:\/\/www.1ai.net\/en\/33308.html","title":{"rendered":"Microsoft's latest report teaches you 'fraud prevention': how to avoid AI-generated fake jobs and scam sites"},"content":{"rendered":"<p>April 17, 2011 - According to foreign media outlet Neowin, the<a href=\"https:\/\/www.1ai.net\/en\/tag\/%e5%be%ae%e8%bd%af\" title=\"[View articles tagged with [Microsoft]]\" target=\"_blank\" >Microsoft<\/a> 16 released the latest edition of the Cybersecurity Signals Report, detailing how to respond to today's<strong>New Threats, Scams and Frauds in Cybersecurity<\/strong>and elaborated <a href=\"https:\/\/www.1ai.net\/en\/tag\/ai\" title=\"[View articles tagged with [AI]]\" target=\"_blank\" >AI<\/a> How to make it \"easier than ever\" to develop malware.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-33309\" title=\"0ee8ccb1j00suudpu00sed000v900hkp\" src=\"https:\/\/www.1ai.net\/wp-content\/uploads\/2025\/04\/0ee8ccb1j00suudpu00sed000v900hkp.jpg\" alt=\"0ee8ccb1j00suudpu00sed000v900hkp\" width=\"1125\" height=\"632\" \/><\/p>\n<p>Microsoft points out that threat actors are getting their money's worth through<strong>Deep counterfeiting, voice cloning, fake employee profiles and fake e-commerce websites and product images<\/strong>and other tactics, are increasing their efforts to deceive potential victims.1AI attach this to the following effect:<\/p>\n<ul>\n<li>AI lowers the technological threshold for online fraud and cybercrime, enabling fraudsters to more<strong>Generate compelling content easily and cheaply<\/strong>, thereby accelerating the frequency of cyberattacks.<\/li>\n<li>AI tools can scan the network for company information, helping attackers build detailed profiles of employees or other targets to create more deceptive social engineering attacks.<\/li>\n<li>In some cases, fraudsters utilize<strong>Fake AI-enhanced product reviews and AI-generated storefronts<\/strong>to lure victims into increasingly sophisticated fraud traps. They build fake websites and e-commerce brands, complete with fake company histories and customer reviews. Through deep fakes, voice cloning, phishing emails and fake websites that look real, malicious actors intend to create a sense of legitimacy on a large scale.<\/li>\n<\/ul>\n<p>Microsoft has made some targeted recommendations:<\/p>\n<ul>\n<li><strong>Enhanced employer identification:<\/strong>Fraudsters often hijack company accounts or fake recruiters to deceive job seekers. To prevent such incidents, recruitment platforms should introduce multi-factor authentication and the Verified ID feature of Microsoft Entra ID to improve account security.<\/li>\n<li><strong>Monitor AI-based recruitment scams:<\/strong>Organizations should deploy deep forgery detection technology to identify AI-generated interviews that have unnatural facial expressions and speech patterns.<\/li>\n<li><strong>Beware of job postings and websites that seem too perfect:<\/strong>Confirm the authenticity of a website by checking its secure connection (https) and using tools such as Microsoft Edge's spell protection.<\/li>\n<li><strong>Avoid providing personal information or payment details to unverified sources:<\/strong>Be wary of \"red flags\" in job postings, such as requests for payment or communication via informal platforms (e.g., SMS, WhatsApp, non-commercial Gmail accounts) or requests for further contact via personal devices.<\/li>\n<\/ul>\n<p>Microsoft also highlighted some of its own apps such as Quick Assist for enhanced protection against tech support scams through means such as digital fingerprinting. Microsoft also mentioned that Edge's<strong>Spell Protection, Domain Name Counterfeiting Protection<\/strong>Functions such as this can also effectively prevent users from entering malicious phishing websites by mistake.<\/p>","protected":false},"excerpt":{"rendered":"<p>April 17 news, according to foreign media Neowin reports, Microsoft 16 released the latest edition of the \"Cybersecurity Signals Report\", detailing how to deal with today's cybersecurity in the field of new types of threats, scams and frauds, and elaborated on how AI can make the development of malware become \"easier than ever\". Microsoft noted that threat actors are getting more out of the way by going deeper and deeper. Microsoft noted that threat actors are increasing their efforts to deceive potential victims through deep fakes, voice cloning, fake employee profiles, and fake e-commerce sites and product images.1AI appended this content to the following effect: AI lowers the technical barriers to cyber fraud and cybercrime, making it easier and cheaper for scammers to generate compelling content, which in turn accelerates the frequency of cyberattacks. AI tools can scan the web<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[146],"tags":[411,280,6333,6332,6331],"collection":[],"class_list":["post-33308","post","type-post","status-publish","format-standard","hentry","category-news","tag-ai","tag-280","tag-6333","tag-6332","tag-6331"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/posts\/33308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/comments?post=33308"}],"version-history":[{"count":0,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/posts\/33308\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/media?parent=33308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/categories?post=33308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/tags?post=33308"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/collection?post=33308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}