When your own voice becomes a weapon: The rise of AI-powered audio fraud
For a long time, phishing emails with poor grammar were the primary tool of cybercriminals. But with the rapid advancement of generative artificial intelligence (AI), the threat potential has changed dramatically. Today, a short audio snippet is enough to clone an ordinary person’s voice with uncanny realism.
This phenomenon, known as “voice cloning” or “deepfake audio,” is revolutionizing scams like the classic “grandchild scam.”

The technology: Three seconds are enough
Where the fraudsters got your vote from
The fraud scenarios
Statistics and risk perception
How to protect yourself
Beliebte Beiträge
Header and footer in Word – First page different in Word
How to make headers different on the first page than on the rest of the pages. Also create custom footers in Word for your documents.
Clean up Excel spreadsheets
It is very easy to use Excel tables created without a system and still get usable data from them with a few tricks.
Insert and edit header and footer in Excel
Inserting a header and footer in Excel is far from user-friendly. We show ways and workarounds how you can do it anyway.
Concatenate text and date in Excel – Tutorial
Concatenating text and date in Excel requires a combination of two functions. We use a practical example to explain how it can be used.
Create and save your own text modules in Word
Create your own text blocks in Word, save them and quickly add ready-made text and graphics to your documents.
Data Queries in Excel – Works with Power Query
So erstellen Sie aktive Datenabfragen durch Power Query aus verschiedensten Quellen in Excel, führen Daten aus verschiedenen Dateien und Tabellen zusammen.

























