{"id":173100,"date":"2023-10-03T08:00:00","date_gmt":"2023-10-03T15:00:00","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=173100"},"modified":"2024-04-16T08:51:34","modified_gmt":"2024-04-16T15:51:34","slug":"artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/","title":{"rendered":"How to Win the Battle Against Deepfakes and Malware"},"content":{"rendered":"<p><span data-contrast=\"auto\">As AI deepfakes and malware understandably grab the headlines, one thing gets easily overlooked\u2014AI also works on your side. It protects you from fraud and malware as well.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For some time now<\/span><span data-contrast=\"none\">, we\u2019ve kept our eye on AI here at McAfee. Particularly as scammers cook up fresh gluts of AI-driven hustles. And there are plenty of them.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">We\u2019ve uncovered how <\/span><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.mcafee.com.mcas.ms%2Fblogs%2Fprivacy-identity-protection%2Fartificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam%2F%3FMcasTsid%3D20892&amp;McasCSRF=25e5b95e9ded5949798f8ed99a5f5be5462b36230bae712aeef1dbaa98ba61cb\"><span data-contrast=\"none\">scammers need only a few seconds of a voice recording to clone it using AI<\/span><\/a><span data-contrast=\"none\">\u2014which has led to all manner of imposter scams. We also showed how <\/span><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.mcafee.com.mcas.ms%2Fblogs%2Fprivacy-identity-protection%2Fcould-chatgpt-cause-heartbreak-with-online-dating-scams%2F%3FMcasTsid%3D20892&amp;McasCSRF=25e5b95e9ded5949798f8ed99a5f5be5462b36230bae712aeef1dbaa98ba61cb\"><span data-contrast=\"none\">scammers can use AI writing tools to power their chats in romance scams<\/span><\/a><span data-contrast=\"none\">, to the extent of writing love poems with AI. Recently, we shared word of <\/span><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.mcafee.com.mcas.ms%2Fblogs%2Finternet-security%2Fspot-fake-news-and-misinformation-in-your-social-media-feed%2F%3FMcasTsid%3D20892&amp;McasCSRF=25e5b95e9ded5949798f8ed99a5f5be5462b36230bae712aeef1dbaa98ba61cb\"><span data-contrast=\"none\">fake news sites packed with bogus articles generated almost entirely with AI<\/span><\/a><span data-contrast=\"none\">. AI-generated videos even played a role in <\/span><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.mcafee.com.mcas.ms%2Fblogs%2Finternet-security%2Fscammers-love-barbie-fake-videos-promote-bogus-ticket-offers-that-steal-personal-info%2F%3FMcasTsid%3D20892&amp;McasCSRF=25e5b95e9ded5949798f8ed99a5f5be5462b36230bae712aeef1dbaa98ba61cb\"><span data-contrast=\"none\">a scam for \u201cBarbie\u201d movie tickets<\/span><\/a><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Law enforcement, government agencies, and other regulatory bodies have taken note. In April, the U.S. Federal Trade Commission (FTC) warned consumers that AI now \u201cturbocharges\u201d fraud online. The commission cited a proliferation of AI tools can generate convincing text, images, audio, and videos.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">While not typically malicious in and of themselves, scammers twist these technologies to bilk victims out of their money and personal information. Likewise, just as legitimate application developers use AI to create code, hackers use AI to create malware.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">There\u2019s no question that all these AI-driven scams mark a major change in the way we stay safe online. Yet you have a powerful ally on your side. It\u2019s AI, as well. And it\u2019s out there, spotting scams and malware. In fact, you\u2019ll find it in our online protection software. We\u2019ve put AI to work on your behalf for some time now.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">With a closer look at how AI works on your side, along with several steps that can help you spot AI fakery, you can stay safer out there. Despite the best efforts of scammers, hackers, and their AI tools.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">AI in the battle against AI-driven fraud and malware.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">One way to think about online protection is this: it\u2019s a battle to keep you safe. Hackers employ new forms of attack that try to work around existing protections. Meanwhile, security professionals create technological advances that counter these attacks and proactively prevent them\u2014which hackers try to work around once again. And on it goes. As technology evolves, so does this battle. And the advent of AI marks a decidedly new era in the struggle.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">As a result, security professionals also employ AI to protect people from AI-driven attacks.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Companies now <\/span><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Ffinance.yahoo.com.mcas.ms%2Fnews%2Fdeepfake-imposter-scams-driving-wave-230008332.html%3FMcasTsid%3D20892&amp;McasCSRF=25e5b95e9ded5949798f8ed99a5f5be5462b36230bae712aeef1dbaa98ba61cb\"><span data-contrast=\"none\">check facial scans for skin texture and translucency<\/span><\/a><span data-contrast=\"none\"> to determine if someone is using a mask to trick facial recognition ID. Banks employ other tools to detect suspicious mouse movements and transaction details that might be suspicious. Additionally, developers scan their code with AI tools to detect vulnerabilities that might lurk deep in their apps\u2014in places that would take human teams hundreds, if not thousands of staff hours to detect. If at all. Code can get quite complex.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">For us, we\u2019ve used AI in our online protection for years now. McAfee has used AI for evaluating events, files, and website characteristics. We have further used AI for detection, which has proven highly effective against entirely new forms of attack.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">We\u2019ve also used these technologies to catalog sites for identifying sites that host malicious files or phishing operations. Moreover, cataloging has helped us shape out parental control features such that we can block content based on customer preferences with high accuracy.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">And we continue to evolve it so that it detects threats even faster and yet more accurately than before. <\/span><span data-contrast=\"auto\">Taken together, AI-driven protection like ours quashes threats in three ways:\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><b><span data-contrast=\"auto\">It detects suspicious events and behaviors.<\/span><\/b><span data-contrast=\"auto\"> AI provides a particularly powerful tool against entirely new threats (also known as zero-day threats). By analyzing the behavior of files for patterns that are consistent with malware behavior, it can prevent a previously unknown file or process from doing harm.\u202f\u202f<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\"><br \/>\n<\/span><\/li>\n<li><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559731&quot;:105,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><b><span data-contrast=\"auto\">It further detects threats by referencing known malware signatures and behaviors.<\/span><\/b><span data-contrast=\"auto\"> This combats zero-day and pre-existing threats alike. AI can spot zero-day threats by comparing them to malware fingerprints and behaviors it has learned. Similarly, its previous learnings help AI quickly spot pre-existing threats in this manner as well.\u202f\u202f<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559731&quot;:105,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><b><span data-contrast=\"auto\">It automatically classifies threats and adds them to the body of threat intelligence. <\/span><\/b><span data-contrast=\"auto\">AI-driven threat protection gets stronger over time. The more threats it encounters, the more rapidly and readily it can determine if files are malicious or benign. Furthermore, AI automatically classifies threats at a speed and scale unmatched by traditional processes. The body of threat intelligence improves immensely as a result.\u202f<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">What does AI-driven protection look like for you? It can identify malicious websites before you can connect to them. It can prevent new forms of ransomware from encrypting your photos and files. And it can keep spyware from stealing your personal information by spotting apps that would connect them to a bad actor\u2019s command-and-control server.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As a result, you get faster and more comprehensive protection with AI that works in conjunction with online protection software\u2014and our security professionals develop them both.\u202f\u202f<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Protect yourself from AI voice clone attacks.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Yet, as it is with any kind of scam, it can take more than technology to spot an AI-driven scam. It calls for eyeballing the content you come across critically. You can spot an AI-driven scam with your eyes, along with your ears and even your gut.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Take AI voice clone <\/span><span data-contrast=\"none\">attacks,<\/span><span data-contrast=\"auto\"> for example. You can protect yourself from them by taking the following steps:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li><b><span data-contrast=\"auto\">Set a verbal codeword with kids, family members, or trusted close friends.<\/span><\/b><span data-contrast=\"auto\"> Make sure it\u2019s one only you and those closest to you know. (Banks and alarm companies often set up accounts with a codeword in the same way to ensure that you\u2019re really you when you speak with them.) <\/span><span data-contrast=\"none\">Ensure<\/span><span data-contrast=\"auto\"> everyone knows and uses it in messages when they ask for help.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Always question the source.<\/span><\/b><span data-contrast=\"auto\"> In addition to voice cloning tools, scammers have other tools that can spoof phone numbers so that they look legitimate. Even if it\u2019s a voicemail or text from a number you recognize, stop, pause, and think. Does that really sound like the person you think it is? Hang up and call the person directly or try to verify the information before responding.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Think before you click and share.<\/span><\/b><span data-contrast=\"auto\"> Who is in your social media network? How well do you really know and trust them? The wider your connections, the more risk you <\/span><span data-contrast=\"none\">might<\/span><span data-contrast=\"auto\"> be opening yourself up to when sharing content about yourself. Be thoughtful about the friends and connections you have online and set your profiles to \u201cfriends and families\u201d only so that they aren\u2019t available to the greater public.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Protect your identity.<\/span><\/b> <a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.mcafee.com.mcas.ms%2Flearn%2Fidentity-monitoring%3Fpath%3Dblogs%26McasTsid%3D20892&amp;McasCSRF=25e5b95e9ded5949798f8ed99a5f5be5462b36230bae712aeef1dbaa98ba61cb\"><span data-contrast=\"none\">Identity monitoring services<\/span><\/a><span data-contrast=\"auto\"> can notify you if your personal information makes its way to the dark web and provide guidance for protective measures. This can help shut down other ways that a scammer can attempt to pose as you.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Clear your name from data broker sites.<\/span><\/b><span data-contrast=\"auto\"> How\u2019d that scammer get your phone number anyway? Chances are, they pulled that information off a data broker site. Data brokers buy, collect, and sell detailed personal information, which they compile from several public and private sources, such as local, state, and federal records, in addition to third parties. Our <\/span><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.mcafee.com.mcas.ms%2Flearn%2Fpersonal-data-cleanup%3Fpath%3Dblogs%26McasTsid%3D20892&amp;McasCSRF=25e5b95e9ded5949798f8ed99a5f5be5462b36230bae712aeef1dbaa98ba61cb\"><span data-contrast=\"none\">Personal Data Cleanup<\/span><\/a><span data-contrast=\"auto\"> scans some of the riskiest data broker sites and shows you which ones are selling your personal info.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<h2><b><span data-contrast=\"auto\">Three ways to spot AI-generated fakes.\u202f\u202f<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">As AI continues its evolution, it gets trickier and trickier to spot it in images, video, and audio. Advances in AI give images a clarity and crispness that they didn\u2019t have before, deepfake videos play more smoothly, and voice cloning gets uncannily accurate.\u202f\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Yet even with the best AI, scammers often leave their fingerprints all over the fake news content they create. Look for the following:\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">1) Consider the context\u202f\u202f<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">AI fakes usually don\u2019t appear by themselves. There\u2019s often text or a larger article around them. Inspect the text for typos, poor grammar, and overall poor composition. Look to see if the text even makes sense. And like legitimate news articles, does it include identifying information \u2014 like date, time, and place of publication, along with the author\u2019s name.\u202f\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">2) Evaluate the claim\u202f<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Does the image seem too bizarre to be real? Too good to be true? Today, \u201cDon\u2019t believe everything you read on the internet,\u201d now includes \u201cDon\u2019t believe everything you see on the internet.\u201d If a fake news story is claiming to be real, search for the headline elsewhere. If it\u2019s truly noteworthy, other known and reputable sites will report on the event\u2014and have done their own fact-checking.\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">3) Check for distortions\u202f<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The bulk of AI technology still renders fingers and hands poorly. It often creates eyes that might have a soulless or dead look to them \u2014 or that show irregularities between them. Also, shadows might appear in places where they look unnatural. Further, the skin tone might look uneven. In deepfaked videos, the voice and facial expressions\u202fmight\u202fnot exactly line up, making the subject look robotic and stiff.\u202f\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">AI is on your side in this new era of online protection.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The battle between hackers and the people behind online protection continues. And while the introduction of AI has unleashed all manner of new attacks, the pattern prevails. Hackers and security professionals tap into the same technologies and continually up the game against each other.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Understandably, AI conjures questions, uncertainty, and, arguably, fear. Yet you can rest assured that, behind the headlines of AI threats, security professionals use AI technology for protection. For good.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Yet an online scam remains an online scam. Many times, it takes common sense and a sharp eye to spot a hustle when you see one. If anything, that remains one instance where humans still have a leg up on AI. Humans have gut instincts. They can sense when something looks, feels, or sounds \u2026off. Rely on that instinct. And give yourself time to let it speak to you. In a time of AI-driven fakery, it still stands as an excellent first line of defense.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As AI deepfakes and malware understandably grab the headlines, one thing gets easily overlooked\u2014AI also works on your side. It&#8230;<\/p>\n","protected":false},"author":1407,"featured_media":175315,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,10661],"tags":[],"coauthors":[15735],"class_list":["post-173100","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-internet-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Win the Battle Against Deepfakes and Malware | McAfee Blog<\/title>\n<meta name=\"description\" content=\"As AI deepfakes and malware understandably grab the headlines, one thing gets easily overlooked\u2014AI also works on your side. It protects you from fraud and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Win the Battle Against Deepfakes and Malware | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"As AI deepfakes and malware understandably grab the headlines, one thing gets easily overlooked\u2014AI also works on your side. It protects you from fraud and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-03T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-16T15:51:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_091223.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jasdev Dhaliwal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jasdev Dhaliwal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/\"},\"author\":{\"name\":\"Jasdev Dhaliwal\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\"},\"headline\":\"How to Win the Battle Against Deepfakes and Malware\",\"datePublished\":\"2023-10-03T15:00:00+00:00\",\"dateModified\":\"2024-04-16T15:51:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/\"},\"wordCount\":1724,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_091223.png\",\"articleSection\":[\"How To Guides and Tutorials\",\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/\",\"name\":\"How to Win the Battle Against Deepfakes and Malware | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_091223.png\",\"datePublished\":\"2023-10-03T15:00:00+00:00\",\"dateModified\":\"2024-04-16T15:51:34+00:00\",\"description\":\"As AI deepfakes and malware understandably grab the headlines, one thing gets easily overlooked\u2014AI also works on your side. It protects you from fraud and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_091223.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_091223.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Guides and Tutorials\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Artificial Intelligence and Winning the Battle Against Deepfakes and Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\",\"name\":\"Jasdev Dhaliwal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"caption\":\"Jasdev Dhaliwal\"},\"description\":\"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/jasdhaliwal\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Win the Battle Against Deepfakes and Malware | McAfee Blog","description":"As AI deepfakes and malware understandably grab the headlines, one thing gets easily overlooked\u2014AI also works on your side. It protects you from fraud and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to Win the Battle Against Deepfakes and Malware | McAfee Blog","og_description":"As AI deepfakes and malware understandably grab the headlines, one thing gets easily overlooked\u2014AI also works on your side. It protects you from fraud and","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2023-10-03T15:00:00+00:00","article_modified_time":"2024-04-16T15:51:34+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_091223.png","type":"image\/png"}],"author":"Jasdev Dhaliwal","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Jasdev Dhaliwal","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/"},"author":{"name":"Jasdev Dhaliwal","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f"},"headline":"How to Win the Battle Against Deepfakes and Malware","datePublished":"2023-10-03T15:00:00+00:00","dateModified":"2024-04-16T15:51:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/"},"wordCount":1724,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_091223.png","articleSection":["How To Guides and Tutorials","Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/","name":"How to Win the Battle Against Deepfakes and Malware | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_091223.png","datePublished":"2023-10-03T15:00:00+00:00","dateModified":"2024-04-16T15:51:34+00:00","description":"As AI deepfakes and malware understandably grab the headlines, one thing gets easily overlooked\u2014AI also works on your side. It protects you from fraud and","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_091223.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/300x200_Blog_091223.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/artificial-intelligence-and-winning-the-battle-against-deepfakes-and-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"How To Guides and Tutorials","item":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/"},{"@type":"ListItem","position":3,"name":"Artificial Intelligence and Winning the Battle Against Deepfakes and Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f","name":"Jasdev Dhaliwal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","caption":"Jasdev Dhaliwal"},"description":"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.","sameAs":["https:\/\/www.linkedin.com\/in\/jasdhaliwal\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/173100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1407"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=173100"}],"version-history":[{"count":8,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/173100\/revisions"}],"predecessor-version":[{"id":188836,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/173100\/revisions\/188836"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/175315"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=173100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=173100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=173100"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=173100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}