{"id":165836,"date":"2024-02-01T05:37:11","date_gmt":"2024-02-01T13:37:11","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=165836"},"modified":"2024-09-22T03:35:38","modified_gmt":"2024-09-22T10:35:38","slug":"ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/","title":{"rendered":"How to Spot Fake Art and Deepfakes"},"content":{"rendered":"<p><span data-contrast=\"auto\">Artificial intelligence (AI) is making its way from high-tech labs and Hollywood plots into the hands of the general population. <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/chatgpt-a-scammers-newest-tool\/\"><span data-contrast=\"none\">ChatGPT<\/span><\/a><span data-contrast=\"auto\">, the text generation tool, hardly needs an introduction and AI art generators (like Midjourney and DALL-E) are hot on its heels in popularity. Inputting nonsensical prompts and receiving ridiculous art clips in return is a fun way to spend an afternoon.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However, while you\u2019re using AI art generators for a laugh, cybercriminals are using the technology to trick people into believing sensationalist fake news, catfish dating profiles, and damaging impersonations. Sophisticated AI-generated art can be difficult to spot, but here are a few signs that you may be viewing a dubious image or engaging with a criminal behind an AI-generated profile.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">What Are AI Art Generators and Deepfakes?<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">To better understand the cyberthreats posed by each, here are some quick definitions:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">AI art generators.<\/span><\/b><span data-contrast=\"auto\"> Generative AI is typically the specific type of AI behind art generators. This type of AI is loaded with billions of examples of art. When someone gives it a prompt, the AI flips through its vast library and selects a combination of artworks it thinks will best fulfill the prompt. AI art is a hot topic of debate in the art world because none of the works it creates are technically original. It derives its final product from various artists, the majority of whom haven\u2019t granted the computer program permission to use their creations.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Deepfake. <\/span><\/b><span data-contrast=\"auto\">A d<\/span><span data-contrast=\"auto\">eepfake is a manipulation of existing photos and videos of real people. The resulting manipulation either makes an entirely new person out of a compilation of real people, or the original subject is manipulated to look like they\u2019re doing something they never did.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">AI art and deepfake aren\u2019t technologies found on the dark web. Anyone can download an <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">AI art or deepfake app<\/span><\/a><span data-contrast=\"auto\">, such as FaceStealer and Fleeceware. Because the technology isn\u2019t illegal and it has many innocent uses, it\u2019s difficult to regulate.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">How Do People Use AI Art Maliciously?<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It\u2019s perfectly innocent to use AI art to create a cover photo for your social media profile or to pair it with a blog post. However, it\u2019s best to be transparent with your audience and include a disclaimer or caption saying that it\u2019s not original artwork. AI art turns malicious when people use images to intentionally trick others and gain financially from the trickery.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/3-signs-you-may-be-caught-in-a-cryptocurrency-romance-scam\/\"><span data-contrast=\"none\">Catfish<\/span><\/a><span data-contrast=\"auto\"> may use deepfake profile pictures and videos to convince their targets that they\u2019re genuinely looking for love. Revealing their real face and identity could put a criminal catfish at risk of discovery, so they either use someone else\u2019s pictures or deepfake an entire library of pictures.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Fake news propagators may also enlist the help of AI art or a deepfake to add \u201ccredibility\u201d to their conspiracy theories. When they pair their sensationalist headlines with a photo that, at quick glance, proves its legitimacy, people may be more likely to share and spread the story. Fake news is damaging to society because of the extreme negative emotions they can generate in huge crowds. The resulting hysteria or outrage can lead to violence in some cases.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Finally, some criminals may use deepfake to trick face ID and gain entry to sensitive online accounts. They can make it appear as if someone you trust said something different from what they actually said. Try out <a href=\"https:\/\/www.mcafee.com\/ai\/deepfake-detector\/\">McAfee Deepfake Detector<\/a> as your defense against malicious and misleading deepfakes.<\/span><\/p>\n<p><span data-contrast=\"auto\">To prevent someone from deepfaking their way into your accounts, protect your accounts with <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/authentication-methods-101\/\"><span data-contrast=\"none\">multifactor authentication<\/span><\/a><span data-contrast=\"auto\">. That means that more than one method of identification is necessary to open the account. These methods can be one-time codes sent to your cellphone, passwords, answers to security questions, or fingerprint ID in addition to face ID.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">3 Ways to Spot Fake Images<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Before you start an online relationship or share an apparent news story on social media, scrutinize images using these three tips to pick out malicious AI-generated art and deepfake.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">1. Inspect the context around the image.<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Fake images usually don\u2019t appear by themselves. There\u2019s often text or a larger article around them. Inspect the text for typos, poor grammar, and overall poor composition. Phishers are notorious for their poor writing skills. AI-generated text is more difficult to detect because its grammar and spelling are often correct; however, the sentences may seem choppy.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">2. Evaluate the claim.<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Does the image seem too bizarre to be real? Too good to be true? Extend this generation\u2019s rule of thumb of \u201cDon\u2019t believe everything you read on the internet\u201d to include \u201cDon\u2019t believe everything you see on the internet.\u201d If a fake news story is claiming to be real, search for the headline elsewhere. If it\u2019s truly noteworthy, at least one other site will report on the event.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">3. Check for distortions.<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">AI technology often generates a finger or two too many on hands, and a deepfake creates eyes that may have a soulless or dead look to them. Also, there may be shadows in places where they wouldn\u2019t be natural, and the skin tone may look uneven. In deepfaked videos, the voice and facial expressions may not exactly line up, making the subject look robotic and stiff.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;335559991&quot;:360}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Boost Your Online Safety With McAfee<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Fake images are tough to spot, and they\u2019ll likely get more realistic the more the technology improves. Awareness of emerging AI threats better prepares you to take control of your online life. There are quizzes online that compare deepfake and AI art with genuine people and artworks created by humans. When you have a spare ten minutes, consider taking a quiz and recognizing your mistakes to identify malicious fake art in the future.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To give you more confidence in the security of your online life, partner with McAfee. <\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/products\/mcafee-plus-ultimate.html?path=blogs\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">McAfee+ Ultimate<\/span><\/a><span data-contrast=\"auto\"> is the all-in-one privacy, identity, and device security service. Protect up to six members of your family with the family plan, and receive up to $2 million in identity theft coverage. Partner with McAfee to stop any threats that sneak under your watchful eye.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence (AI) is making its way from high-tech labs and Hollywood plots into the hands of the general population&#8230;.<\/p>\n","protected":false},"author":1408,"featured_media":165851,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,13],"tags":[5091,15763,15762,5975],"coauthors":[15741],"class_list":["post-165836","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-privacy-identity-protection","tag-ai","tag-ai-art","tag-deepfake-videos","tag-deepfakes"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Spot Fake Art and Deepfakes | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Artificial intelligence (AI) is making its way from high-tech labs and Hollywood plots into the hands of the general population. ChatGPT, the text\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Spot Fake Art and Deepfakes | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Artificial intelligence (AI) is making its way from high-tech labs and Hollywood plots into the hands of the general population. ChatGPT, the text\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-01T13:37:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-22T10:35:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/03\/300x200_Blog_031623.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Amy Bunn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amy Bunn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/\"},\"author\":{\"name\":\"Amy Bunn\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3\"},\"headline\":\"How to Spot Fake Art and Deepfakes\",\"datePublished\":\"2024-02-01T13:37:11+00:00\",\"dateModified\":\"2024-09-22T10:35:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/\"},\"wordCount\":1024,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/03\/300x200_Blog_031623.png\",\"keywords\":[\"AI\",\"AI Art\",\"Deepfake videos\",\"deepfakes\"],\"articleSection\":[\"How To Guides and Tutorials\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/\",\"name\":\"How to Spot Fake Art and Deepfakes | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/03\/300x200_Blog_031623.png\",\"datePublished\":\"2024-02-01T13:37:11+00:00\",\"dateModified\":\"2024-09-22T10:35:38+00:00\",\"description\":\"Artificial intelligence (AI) is making its way from high-tech labs and Hollywood plots into the hands of the general population. ChatGPT, the text\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/03\/300x200_Blog_031623.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/03\/300x200_Blog_031623.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Guides and Tutorials\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"AI in the Hands of Cybercriminals: How to Spot Fake Art and Deepfakes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3\",\"name\":\"Amy Bunn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b58be83668cf2b1de7fb5b8a222bb835\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg\",\"caption\":\"Amy Bunn\"},\"description\":\"Amy Bunn is head of communications at McAfee and has worked in technology and cybersecurity for over 15 years. During this time, Amy has witnessed the changing technology landscape and the critical role that online protection plays today. Amy believes that families and individuals around the world should be free to enjoy all the benefits and advantages that the internet and technology afford and is passionate about making this a reality by discussing the very latest in cybersecurity tips and advice, which, when combined with robust online protection, can help empower people to live their life online with total confidence.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/amy-bunn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Spot Fake Art and Deepfakes | McAfee Blog","description":"Artificial intelligence (AI) is making its way from high-tech labs and Hollywood plots into the hands of the general population. ChatGPT, the text","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to Spot Fake Art and Deepfakes | McAfee Blog","og_description":"Artificial intelligence (AI) is making its way from high-tech labs and Hollywood plots into the hands of the general population. ChatGPT, the text","og_url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-02-01T13:37:11+00:00","article_modified_time":"2024-09-22T10:35:38+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/03\/300x200_Blog_031623.png","type":"image\/png"}],"author":"Amy Bunn","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Amy Bunn","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/"},"author":{"name":"Amy Bunn","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3"},"headline":"How to Spot Fake Art and Deepfakes","datePublished":"2024-02-01T13:37:11+00:00","dateModified":"2024-09-22T10:35:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/"},"wordCount":1024,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/03\/300x200_Blog_031623.png","keywords":["AI","AI Art","Deepfake videos","deepfakes"],"articleSection":["How To Guides and Tutorials","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/","url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/","name":"How to Spot Fake Art and Deepfakes | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/03\/300x200_Blog_031623.png","datePublished":"2024-02-01T13:37:11+00:00","dateModified":"2024-09-22T10:35:38+00:00","description":"Artificial intelligence (AI) is making its way from high-tech labs and Hollywood plots into the hands of the general population. ChatGPT, the text","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/03\/300x200_Blog_031623.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/03\/300x200_Blog_031623.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"How To Guides and Tutorials","item":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/"},{"@type":"ListItem","position":3,"name":"AI in the Hands of Cybercriminals: How to Spot Fake Art and Deepfakes"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3","name":"Amy Bunn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b58be83668cf2b1de7fb5b8a222bb835","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg","caption":"Amy Bunn"},"description":"Amy Bunn is head of communications at McAfee and has worked in technology and cybersecurity for over 15 years. During this time, Amy has witnessed the changing technology landscape and the critical role that online protection plays today. Amy believes that families and individuals around the world should be free to enjoy all the benefits and advantages that the internet and technology afford and is passionate about making this a reality by discussing the very latest in cybersecurity tips and advice, which, when combined with robust online protection, can help empower people to live their life online with total confidence.","url":"https:\/\/www.mcafee.com\/blogs\/author\/amy-bunn\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/165836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1408"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=165836"}],"version-history":[{"count":8,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/165836\/revisions"}],"predecessor-version":[{"id":201897,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/165836\/revisions\/201897"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/165851"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=165836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=165836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=165836"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=165836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}