{"id":96114,"date":"2024-07-25T08:45:46","date_gmt":"2024-07-25T16:45:46","guid":{"rendered":"https:\/\/www.trendmicro.com\/internet-safety?p=96114"},"modified":"2024-08-05T03:06:55","modified_gmt":"2024-08-05T11:06:55","slug":"how-to-protect-yourself-from-deepfakes","status":"publish","type":"post","link":"https:\/\/www.trendmicro.com\/internet-safety\/blog\/how-to-protect-yourself-from-deepfakes\/","title":{"rendered":"How to Protect Yourself from Deepfakes\u00a0"},"content":{"rendered":"\n<p>Deepfakes leverage artificial intelligence to produce highly realistic yet fake videos or audio of people, making it seem like they are saying or doing things they never actually did. Deepfake technology is being used to scam people on live video calls, posing significant risks to individuals and organizations alike.&nbsp;<\/p>\n\n\n\n<p>On a video call, how do you know if you\u2019re speaking to the real person or an impersonator using deepfake technology? In a world filled with deepfakes, seeing is no longer believing, so understanding and combating the dangers they pose is more crucial than ever. For a deep dive into what exactly a deepfake is and how to spot them, check out our <strong><a href=\"https:\/\/www.trendmicro.com\/internet-safety\/blog\/deepfakes-101\" target=\"_blank\" rel=\"noopener\" title=\"\">Deepfakes 101<\/a><\/strong> post.\u00a0\u00a0<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">The Dangers of Deepfakes&nbsp;<\/h2>\n\n\n\n<p>In a recent Trend Micro study conducted in June 2024, <strong>64% of people reported that they are very or extremely concerned with criminals using deepfakes to scam people<\/strong><sup><strong>1<\/strong><\/sup>.&nbsp; Deepfake video calls in particular present a wide range of dangers, including identity theft and fraud, where scammers convincingly impersonate others for financial gain, as seen in a case <a href=\"https:\/\/www.cnn.com\/2024\/02\/04\/asia\/deepfake-cfo-scam-hong-kong-intl-hnk\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">where a Hong Kong finance worker was duped into transferring $25 million<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<p>What\u2019s particularly concerning about deepfake video calls is that cybercriminals can convincingly impersonate anyone\u2014a friend, a new romantic partner, or a prospective employer\u2014making it increasingly challenging to verify the true identity of the person you are communicating with.&nbsp;&nbsp;<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"700\" src=\"https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2024\/07\/deepfakes-definition-trend-micro-deepfake-inspector-banner.webp\" alt=\"Text 'Deepfake (n.) People use faceswapping technology to impersonate people' promoting Trend Micro Deepfake Inspector\" class=\"wp-image-96315\" style=\"box-shadow:var(--wp--preset--shadow--natural)\" srcset=\"https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2024\/07\/deepfakes-definition-trend-micro-deepfake-inspector-banner.webp 700w, https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2024\/07\/deepfakes-definition-trend-micro-deepfake-inspector-banner-480x480.webp 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 700px, 100vw\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Top Tips to Spot Deepfake Video Callers&nbsp;<\/h2>\n\n\n\n<p>Below are some best practices for identifying and mitigating the risks of deepfake video calls:&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Be Skeptical&nbsp;<\/h3>\n\n\n\n<p>Adopting a skeptical mindset is a great practical real-time defense. When interacting with someone online or over video call:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ask questions that only the real person would know the answers to, or refer to a fake event or a made-up name of a friend. How they answer or respond will help confirm their identity.&nbsp;<br><\/li>\n\n\n\n<li>Trust your instincts. If something feels off\u2014even if they look, sound, and act like someone you know\u2014end the video call and contact the real person directly, ideally using another method of communication (phone call, for example).&nbsp;<br><\/li>\n\n\n\n<li>Additionally, be extra suspicious of out-of-the-blue requests for money or personal information, such as your Social Security number or bank details. As a rule, never send money or share personal information with anyone without properly verifying their identity. Remember, a stranger could be impersonating someone you know.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Use Technology to Spot Deepfakes&nbsp;<\/h3>\n\n\n\n<p>Deepfakes are becoming increasingly sophisticated, making it difficult for humans to tell the real from the fake. Our newly launched tool, <strong><a href=\"https:\/\/api.link.trendmicro.com\/events\/landing-page?product_id=5122f&amp;source=iskf&amp;platform=windows\" target=\"_blank\" rel=\"noopener\" title=\"\">Trend Micro Deepfake Inspector<\/a><\/strong>, can help you verify the identities of people on video calls in real time, ensuring they are not using deepfake technology to alter their appearance. Best of all, this brand-new tool is completely free! Click the button below to learn more and download Trend Micro Deepfake Inspector today.&nbsp;<\/p>\n\n\n\n<div class=\"row\">\n        <div class=\"col-md-8 offset-md-2\">\n            <div class=\"ratio ratio-16x9\">\n                <iframe src=\"https:\/\/www.youtube.com\/embed\/Z2mj-9htCJ0\" allowfullscreen><\/iframe>\n            <\/div>\n        <\/div>\n    <\/div>\n<br>\n\n\n\n<p class=\"text-center\">\n<a href=\"https:\/\/api.link.trendmicro.com\/events\/landing-page?product_id=5122f&#038;source=iskf&#038;platform=windows\" target=\"_blank\" class=\"btn btn-danger btn-lg btn-block w-100 d-none d-lg-block interstate\" rel=\"noopener\">Download Trend Micro Deepfake Inspector &nbsp;&nbsp;<small style=\"font-size:12px\">It&#8217;s free<\/small><\/a>\n<a href=\"https:\/\/api.link.trendmicro.com\/events\/landing-page?product_id=5122f&#038;source=iskf&#038;platform=windows\" target=\"_blank\" class=\"btn btn-danger btn-block w-100 d-md-block d-lg-none interstate\" rel=\"noopener\">Download Trend Micro Deepfake Inspector <span class=\"d-none d-md-inline\">&nbsp;&nbsp;<\/span><small style=\"font-size:12px\">It&#8217;s free<\/small><\/a>\n<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Don\u2019t Overshare Online&nbsp;<\/h3>\n\n\n\n<p>Be cautious about the information you share online, as oversharing could arm scammers with information they could use to deceive you.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Report Suspected Deepfakes&nbsp;<\/h3>\n\n\n\n<p>If you encounter a suspected deepfake designed to scam you, defraud you, or steal your identity, report it to the relevant authorities, such as your local police department and consumer protection agencies (the Federal Trade Commission, if you live in the USA, for example), and to the platform where you saw it. Prompt reporting can help mitigate the spread of fake content and protect others from being deceived by the deepfake.&nbsp;<\/p>\n\n\n\n<style>\n#left-area .entry-content ol>li {\n    margin: 0 0 15px 0;\n    padding: 0px;\n    text-indent: -1em;\n    margin-left: 1em;\n}\n#left-area .entry-content ul>li {\n    margin: 0 0 15px 0;\n    padding: 0px;\n}\n@media screen and (max-width:767px) {\n.btn > small {display:block}\n}\n<\/style>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<br>\n\n\n\n<h3 class=\"wp-block-heading\">Challenging, But Not Unsolvable&nbsp;<\/h3>\n\n\n\n<p><\/p>\n\n\n\n<p>There\u2019s no doubt about it, deepfakes pose significant challenges to our privacy, security, and society in general. However, with the right critical mindset, ongoing education, and tools (like the brand-new <strong>Trend Micro Deepfake Inspector<\/strong>), we can all effectively mitigate the risks and protect ourselves from potential harm.&nbsp;<\/p>\n\n\n\n<p>To learn more about Trend Micro <a href=\"https:\/\/api.link.trendmicro.com\/events\/landing-page?product_id=5122f&amp;source=iskf&amp;platform=windows\" target=\"_blank\" rel=\"noopener\" title=\"\">Deepfake Inspector<\/a> and how it can help you spot people using AI to alter their appearance on video calls, click the button below.&nbsp;<\/p>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"700\" src=\"https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2024\/07\/identify-deepfake-in-real-time-trend-micro-deepfake-inspector-banner.webp\" alt=\"Picture of an ongoing video call on a laptop with texts 'Anomalies detected' and 'Identify deepfakes in real time' promoting the free Trend Micro Deepfake Inspector\" class=\"wp-image-96253\" style=\"box-shadow:var(--wp--preset--shadow--natural)\" srcset=\"https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2024\/07\/identify-deepfake-in-real-time-trend-micro-deepfake-inspector-banner.webp 700w, https:\/\/www.trendmicro.com\/internet-safety\/wp-content\/uploads\/2024\/07\/identify-deepfake-in-real-time-trend-micro-deepfake-inspector-banner-480x480.webp 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 700px, 100vw\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p class=\"text-center\">\n<a href=\"https:\/\/api.link.trendmicro.com\/events\/landing-page?product_id=5122f&#038;source=iskf&#038;platform=windows\" target=\"_blank\" class=\"btn btn-danger btn-lg btn-block w-100 d-none d-lg-block interstate\" rel=\"noopener\">Download Trend Micro Deepfake Inspector &nbsp;&nbsp;<small style=\"font-size:12px\">It&#8217;s free<\/small><\/a>\n<a href=\"https:\/\/api.link.trendmicro.com\/events\/landing-page?product_id=5122f&#038;source=iskf&#038;platform=windows\" target=\"_blank\" class=\"btn btn-danger btn-block w-100 d-md-block d-lg-none interstate\" rel=\"noopener\">Download Trend Micro Deepfake Inspector <span class=\"d-none d-md-inline\">&nbsp;&nbsp;<\/span><small style=\"font-size:12px\">It&#8217;s free<\/small><\/a>\n<\/p>\n\n\n\n<p>If you\u2019ve found this article\u202finteresting or helpful, please\u202fSHARE\u202fit with friends and family to help keep the online community secure and protected.\u202f<\/p>\n\n\n\n<p><sup><strong>1<\/strong><\/sup> <small>Trend Micro Snap Study \u2013 Consumers and Deepfakes, Conducted June \u2013 July 2024, US &amp; Australia, N=2097<\/small>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Deepfakes leverage artificial intelligence to produce highly realistic yet fake videos or audio of people, making it seem like they are saying or doing things they never actually did. Deepfake technology is being used to scam people on live video calls, posing significant risks to individuals and organizations alike.&nbsp; On a video call, how do [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":96117,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[762,3,4],"tags":[747,759,761,756,755,760,171],"class_list":["post-96114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-adults","category-for-parents","category-for-teachers","tag-deepfake-2","tag-deepfake-calls","tag-deepfake-detection","tag-deepfake-inspector","tag-deepfake-scam","tag-deepfake-videos","tag-deepfakes","wpautop"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/96114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/comments?post=96114"}],"version-history":[{"count":2,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/96114\/revisions"}],"predecessor-version":[{"id":96482,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/96114\/revisions\/96482"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/media\/96117"}],"wp:attachment":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/media?parent=96114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/categories?post=96114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/tags?post=96114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}