|
Surfshark VPN : Award-winning VPN service
|
Posts: 2,104
Threads: 526
Thanks Received: 7,139 in 2,078 posts
Thanks Given: 1,811
Joined: 14 August 18
23 October 25, 04:39
(This post was last modified: 23 October 25, 04:47 by jasonX.)
Surfshark's Web Content Blocker
![[Image: sUPJFDn.jpeg]](https://i.imgur.com/sUPJFDn.jpeg)
Manage content access with the web content blocker
- Protect family members by blocking harmful content
- Customize content access for age-appropriateness
- Prevent unauthorized changes with 2FA
Why should you choose a web content blocker?
Surfshark's Web Content Blocker is a fresh approach to online safety that differs from traditional parental controls. Instead of focusing on monitoring specific websites or restricting users, it offers a respectful way to block access to your selected website categories — without keeping tabs on online activities.
Web Content Blocker focuses on safeguarding every household when browsing online. It allows you to filter various websites based on categories provided, lock them using 2FA (Two-factor Authentication), and help protect family members from potential online threats caused by curiosity or carelessness. Unlike traditional tracking applications, the web content blocker helps you protect family members from seeing malicious content and websites — without snooping on their browsing activity or monitoring the actual websites they visit. With this new feature, you can filter various websites by category and lock specific content across all family mobile devices.
Surfshark's New Feature is GREAT!
Secure browsing with a web content blocker
Protect yourself and your family and enhance productivity with our category-based content controls. Block unwanted content, restrict access to distracting sites, and ensure a safe online environment for everyone.
- Prevent gambling sites on family devices
Ensure a safe online environment for your family by blocking access to gambling sites on all devices.
- Restrict distractions on work devices
Enhance productivity by restricting access to distracting websites on devices used for work.
- Block adult content on children devices
Protect your children from inappropriate content by blocking adult websites on their devices.
All-in-one protection, plus added privacy: Surfshark One+
Enjoy overall protection online and offline with our suite for next-level privacy and security, Surfshark One+.
![[Image: d5ykQUK.jpeg]](https://i.imgur.com/d5ykQUK.jpeg)
See more HERE
Data and info derived / lifted from Surfshark with permission
The following 1 user says Thank You to jasonX for this post:1 user says Thank You to jasonX for this post
• harlan4096
Posts: 2,104
Threads: 526
Thanks Received: 7,139 in 2,078 posts
Thanks Given: 1,811
Joined: 14 August 18
Surfshark has 4,500+ servers worldwide!
Surfshark shares some great news with all of us! The Surfshark network has grown to 4,500+ servers — quiet progress, powerful results. Read on below!
Why does it matter?
Every server added helps make your online experience smoother, and more secure. Surfshark focuses on quality, not quantity, with each server running at least 10Gbps and featuring industry-first self-healing server infrastructure.
What new servers did we add?
Over the years, Surfshark continuously upgraded their server network for better performance and reliability, and this updated server count shows their growth.
This time, they did not add any new locations, just expanded the server count at existing sites. The most significant additions are in the US, the UK, and Japan regions.
Along with the improvement they also enhanced the dedicated IP network and implemented improvements to help minimize CAPTCHA interruptions.
What does it mean to you?
Updating the server count is essential for effectively implementing new features like self-healing infrastructure or VPN route optimization. This expansion also supports the growing user base and ensures technological advancements are more ready for the future.
What is self-healing infrastructure?
Everlink is our patented VPN server infrastructure that makes every connection more stable. In the event of a server failure or maintenance, Everlink functions as a self-healing mechanism, reconfiguring the VPN tunnel without disconnecting the user from the service. This ensures a smoother, more reliable experience, akin to infinite connection.
Throughout this process, all users remain connected to the VPN, keeping data protected and IP address hidden. Surfshark Everlink servers are globally distributed, and adding more servers ensures this feature remains consistently available.
What is VPN route optimization?
Surfshark's server route optimization continuously evaluates and adjusts routes in real-time to ensure data travels along the most optimized and stable pathways, improving internet performance. Currently available for macOS devices, optimization covers key locations: Sydney, Seattle, and Vancouver. Surfshark has an option to expand this feature to even more countries with more servers available!
How is this possible?
This possbilities is due to Surfshark's exclusive technology, Surfshark Nexus. It uses Software Defined Networking (SDN) to connect VPN servers to a single, global network. With all servers unified, users can connect to any country, switch locations, and enjoy the same security, since all servers are part of the same network. This unified server network enhances all VPN experience by making all connections safer and stronger. Nexus also paves the way for more server infrastructure innovations.
How do you select the best server?
The best server for users will depend on what they are looking for. If a user is after faster speeds, select the server closest to your location or simply select the 'Fastest location' option in the Surfshark app.
If the user wants a specific IP address, any server in his preferred country will work. All he has to do is select the country from the locations list. On the security front, all servers are equally safe. To connect to a VPN, simply click the Quick-connect button.
Data and info derived / lifted from Surfshark with permission
Posts: 2,104
Threads: 526
Thanks Received: 7,139 in 2,078 posts
Thanks Given: 1,811
Joined: 14 August 18
Surfshark: A new standard for VPN speed - introducing 100Gbps servers
Surfshark is thrilled to introduce an advancement in VPN (Virtual Private Network) hardware with the launch of Surfshark’s new 100Gbps servers in Amsterdam, the Netherlands. This development represents a major leap forward from the standard 10Gbps servers — a leap designed to meet the increasing demands of today’s digital landscape. Read on below!
Why does 100Gbps matter?
The demand for faster and more reliable internet is skyrocketing. With more devices in every household, higher-quality video streaming, and larger software updates, the need for speed is greater than ever. The new 100Gbps servers offers 10 times the capacity of the previous 10Gbps standard, ensuring every internet experience is smooth and uninterrupted, even during peak times.
World's first 100Gbps VPN server
What does this mean for all users?
The new servers are a step into the future of VPNs. With it, all users can enjoy full internet speed and:
- Future-proofing Surfshark's performance
The number of internet users is increasing. With this update, Surfshark is preparing for the future and making sure that heavy internet activity by others won’t slow down the user's internet connection. Imagine downloading a big OS update while someone else streams 4K video without any buffering. This update keeps the user's video calls clear, even when a roommate uploads files.
- High-quality streaming and VR
As streaming will continue to evolve to 4K, 8K, and even 360°, and as virtual reality will become more integrated into daily life, the new 100Gbps servers will ensure that all users have the bandwidth needed for these high-demand applications.
- Smoother gaming and virtual meetings
High-speed internet means lag-free gaming and virtual meetings. With this update, Surfshark ensures that the increasing number of internet users won’t result in buffering, and all can get a more seamless experience, even during the busiest times.
- Greater peak-time reliability
With a 100Gbps server, more users can connect to the same server without experiencing slowdowns. This means that even with the increasing number of internet users, Surfshark users will continue getting more stable gaming pings, fewer buffering issues, and smoother work calls.
Surfshark - Shaping the future of VPNs
With 100Gbps servers, Surfshark is not just keeping up with the future. They are leading the way! This new standard — enabled by bigger pipes, faster encryption, smarter software paths, and better load distribution — delivers consistently high speeds, greater stability, and the capacity needed for the next wave of bandwidth-intensive use. At the moment, they are testing this innovation with a few servers, laying the foundation for potential future rollouts.
MORE Info HERE
Data and info derived / lifted from Surfshark with permission
The following 1 user says Thank You to jasonX for this post:1 user says Thank You to jasonX for this post
• harlan4096
Posts: 2,104
Threads: 526
Thanks Received: 7,139 in 2,078 posts
Thanks Given: 1,811
Joined: 14 August 18
18 March 26, 04:17
(This post was last modified: Today, 08:16 by jasonX.)
Surfshark Apps Version Updates
Windows App Changelog - Surfshark 6.6.0 (2026-03-05)
What's new:
- This release includes various small optimizations and fixes to enhance the Surfshark app's stability and usage.
Windows App Changelog - Surfshark 6.5.0 (2026-02-06)
What's new:
- This release includes various small optimizations and fixes to enhance the Surfshark app's stability and usage.
- Great news for Surfshark Antivirus users! You can now click on your protection history to get insights into what actions were taken by the antivirus;
- We improved our Refer and Earn screen, making it easier than ever to refer friends and earn rewards;
- We upgraded our Clean Web ad blocker for improved performance and effectiveness;
- As always, we added a few app improvements for even smoother surfing.
macOS App Changelog - Surfshark 4.26.0 (20-02-2026)
What's new:
- Good news for Surfshark One / One+ users, You can now block unwanted content categories by using the newest web content blocker tool.
- As always, we've implemented a few bugs fixes and improvements to ensure our app is running smoothly.
iOS App Changelog - Surfshark 3.33.3 (13-03-2026)
What's new:
- We did some minor VPN performance fixes and sligh app improvements so you can surf even smoother.
Android App Changelog - Surfshark 3.26.1 (2026-03-06) / 3.26.0 (2026-02-20)
What's new:
- Authenticating via Apple or Microsoft accounts should be easier with this new fix, which addresses an issue causing application termination;
- Enjoy improved VPN connection stability in cases when the network experiences drops or interruptions;
- As always, we added minor bug fixes and performance optimizations to improve your experience with the Surfshark VPN app.
Surfshark Browser Extension / Add-ons
- Firefox Add-on version 4.38.1 (01-30-2026)
- Edge Add-on version 4.39.0 (02-03-2026)
- Surfshark VPN Extension version 4.40.0 (03-10-2026)
Data and info derived / lifted from Surfshark with permission
The following 1 user says Thank You to jasonX for this post:1 user says Thank You to jasonX for this post
• harlan4096
Posts: 2,104
Threads: 526
Thanks Received: 7,139 in 2,078 posts
Thanks Given: 1,811
Joined: 14 August 18
149M passwords exposed: what to do after a data leak
News of a large-scale privacy breach or a new data security incident seems to hit the headlines every week, leaving millions of us wondering: “Is it my turn to be a victim?“ --Ms. Ema Pennell of Surfshark shares us info on what to do after a data leak. Read on below.
How and why did a 149M password leak happen?
Recently, a security researcher discovered a massive, unsecured database containing a staggering 149 million stolen usernames and passwords. This wasn’t some small-scale data leak — the records were collected from victims all over the world and included almost every type of account you can think of.
We are talking about major online services and platforms like Facebook, Instagram, TikTok, and X (formerly Twitter), as well as entertainment giants like Netflix, Disney+, and HBO Max. Even credentials for gaming platforms like Roblox and niche services like OnlyFans were part of this mess.
This wasn’t a direct hack of any of these services. Instead, the researcher believes this data was harvested using infosealing malware — software that infects a device and uses a keylogging technique to record everything a user types, including those exposed online credentials as they log in to their accounts.
This 96 GB database of stolen records was left completely unprotected on the open web, accessible to anyone with a browser. Consequences of a data breach of this size can be dire, fueling a wave of identity theft, financial fraud, and targeted phishing. After all, if such data is leaked, a cybercriminal doesn’t even need to hack into your accounts; they can simply use your password to log in unnoticed.
Quote:“Data breaches are a constant threat, and your data is likely already exposed. Our focus must shift from simply reacting to incidents to changing our habits more broadly, for example, using personal data in ways that minimize the risk of loss or limit harm to us.”
– Tomas Stamulis, Chief Security Officer at Surfshark
If you’re wondering whether your data is part of this breach, or simply want to prepare and have a post-data breach response plan, read along.
Here are the main steps to take after a data breach to secure your accounts and online presence:
![[Image: bHIIb9M.png]](https://i.imgur.com/bHIIb9M.png)
1. Check if your data was exposed
The first step in any data leak recovery is knowing where you stand: was your data exposed at all? If yes, you’ll need to verify which exact details were included in the data security incident. You can start with a trusted data leak checker to check if any of your emails are associated with a breach.
For a more comprehensive investigation, as well as monitoring future data leaks, use a reliable tool like Surfshark Alert. It checks whether your email addresses, along with related passwords, credit cards, and your ID or Social Security Number (SSN), appear in recent leaks.
Also, look out for official emails like an Instagram security email or notifications from other services. However, be cautious, as hackers may exploit large-scale leaks to send fake breach alerts that trick you into clicking malicious links. If you received such an email, it’s better to navigate directly to the website instead of clicking a link in the email.
Most importantly, you need to understand the scope of your exposed data: was it just your email address, or did a password get compromised? Did the privacy breach include more sensitive data like your home address or credit card details? This will help you prioritize your next steps.
2. Change your passwords
If you find that your passwords were involved in a data breach, you need to act fast, especially if you’ve reused them for multiple accounts — a password compromised in one place can be a threat to every other account using the same login credentials:
- Prioritize affected accounts. Your immediate response should be changing the password for the specific service mentioned in the leak. For example, if it was a Facebook password breach, start there;
- Cut the password chain. If you use the same password for Facebook, your bank, and other important accounts, a single Facebook breach can give a hacker an in to your entire online life. Change them all;
- Make your new passwords strong and unique. A strong password should be at least 12 characters long, use a mix of letters, numbers, and symbols, and not be reused for multiple accounts;
- Use a password manager. You don’t need to try to memorize dozens of complex passwords. To make your life easier, consider a secure password manager to generate and store them safely.
3. Enable multi-factor authentication
If there is one essential safeguard in data breach security, it’s two- or multi-factor authentication (2FA or MFA). Let’s say a hacker found your Facebook data leak credentials. Depending on which MFA option you choose, they won’t be able to get in without an additional security step. It can be a temporary code sent to your secure device (either via a message or generated by an app), a fingerprint or face scan, or a physical security key.
Consider setting up MFA everywhere it’s available: social media, banking, and even your shopping and gaming accounts, to secure them from potential future incidents.
4. Track your bank accounts
When an information breach happens, the end goal for most criminals is money. Even if your banking password wasn’t part of a cyberleak, hackers can use the pieces of your personal info scattered online to try and talk their way into your financial accounts.
Here’s what you should do:
- Set up alerts. Enable real-time notifications for every transaction on your debit and credit cards;
- Review statements. If you see a charge you didn’t make, even as small as $1.00, report it immediately — hackers often test a card with small amounts before going big;
- Report fraud fast. If you see something suspicious, call your financial institutions immediately. The faster you report the credit card fraud, the better your chances of getting the stolen money back.
5. Monitor your credit report
Your data leaked online can lead to identity theft. Sounds threatening, but it’s true — criminals can use the exposed information to open new accounts, credit cards, or take loans in your name. This is why a post-data leak action plan must include credit monitoring.
Pro tip: You are entitled to free credit reports from major credit bureaus (Equifax, Experian, and TransUnion). Request them and look for any accounts or inquiries you don’t recognize.
If you believe your accounts may be compromised, consider placing a credit freeze — it’s one of the most effective ways to prevent anyone from opening new credit in your name. Keep in mind that this includes you, too, until you unfreeze it.
If a credit freeze feels too extreme, you could place a fraud alert on your credit report, which tells businesses they must verify your identity before issuing credit.
Quote:If you don’t want to be a part of the next big headline, focus on your digital hygiene. Start by minimizing the data you share — if a service doesn’t strictly need your phone number or home address, don’t give it. Additionally, try using an alternative persona online as much as possible. And most importantly, stay curious and informed. Consider our article on more ways hackers get your information and how to protect yourself online as your next read.
Bottom line: secure your digital life
Data leaks are a reality of our modern, connected world, but they don’t have to result in a digital disaster. While you can’t control whether a major company has a data security incident, you can control how you respond and protect your own devices.
By following this incident response plan, you can turn a potentially devastating breach into a minor inconvenience. Tools like Surfshark Alert can add an extra layer of protection by notifying you the second your data hits the dark web.
More additional info HERE
Data and info derived / lifted from Surfshark with permission
The following 1 user says Thank You to jasonX for this post:1 user says Thank You to jasonX for this post
• harlan4096
Posts: 2,104
Threads: 526
Thanks Received: 7,139 in 2,078 posts
Thanks Given: 1,811
Joined: 14 August 18
AI voice scams: what they are, how they work, & how to protect yoursel
AI voice scams use convincing voice clones to trick you into sending money or sharing sensitive information. Since all it takes is a short recording and free software, these scams are now easier than ever to pull off and increasingly common.
To protect yourself, it helps to understand the basics — the methods, the different types, and the warning signs. With that in mind, let’s start by looking at what AI voice scams actually involve. -- Mr. Jon Sidor of Surfshark shares us some info/tips to protect ourselves from AI voice scams.
What are AI voice scams, and how do they work?
AI voice scams involve criminals using artificial intelligence to clone a real person’s voice and make fake calls that sound real. They can seem like an elaborate, high-tech heist, but the idea behind them is actually rather straightforward. During these calls, scammers apply pressure, induce panic, or establish trust to push their target into acting fast. Whatever angle they take, the goal is usually the same: to steal money or personal information.
How AI voice cloning works
![[Image: V4iSgS7.png]](https://i.imgur.com/V4iSgS7.png)
At the heart of these scam calls that trick many into parting with their money or personal information is AI voice cloning. Simply put, AI voice cloning trains a computer to copy the unique traits of a person’s voice so that it can recreate the voice accurately.
Step 1
It all starts with feeding the AI audio clips of a person speaking. Longer samples are better, but even just a few seconds of audio can give the AI enough to work with.
Step 2
From these snippets, the AI identifies what makes the voice distinctive — picking up on characteristics like pitch and tone, rhythm and tempo, pronunciation, inflection, and more.
Step 3
Once it has learned these patterns, the AI can generate entirely new speech — using words, phrases, and expressions the person never actually said — while still sounding like the original voice.
Step 4
Scammers can then use the voice model to create fake messages or even make live calls that sound eerily real.
Why are AI voice scams rising?
Deepfake-related losses — including those linked to AI voice cloning scams — have surged to $1.56 billion. More than $1 billion of that happened in 2025 alone.
These scams are seemingly mushrooming, and here’s why:
- Free or cheap AI tools: low-cost or free online tools remove the need for sophisticated setups and expensive software;
- Ease of use: most modern voice-cloning programs are simple and user-friendly, allowing anyone to create a clone in minutes — no technical know-how necessary;
- More voice content available: criminals now have a much larger pool of material to work with as people constantly share voice notes, post videos, and use voice assistants;
- Realistic results: modern AI can replicate tone and emotion almost flawlessly, making manipulation more effective;
- Increased visibility: growing public awareness and media coverage push these scams into the spotlight, making each case more noticeable.
How scammers get your voice
With so much content and audio shared online these days, getting hold of your personal info — including your voice — is easier than you might think. Let’s run through some common methods scammers use to collect voice samples.
- Social media videos
Social platforms like TikTok, Instagram, and YouTube are the most common hunting grounds for scammers looking for audio samples. Just 5-10 seconds of casual talk about your lunch or weekend plans can be enough to create a clone. Since these clips are natural and usually high quality, scammers can feed them straight into voice-cloning software.
- Voicemail greetings
Scammers can also grab your voice from voicemail greetings, either through leaked data or by calling your number and recording it. These clips are pretty handy for bad actors since they capture natural speech and often include a name. Plus, since most people practice and record multiple takes before settling on one, the audio usually needs little to no cleanup.
- Interviews, podcasts, and webinars
Public recordings like podcasts, interviews, panels, and webinars are easy for AI to clone. They provide high-quality speech, which helps the AI model to replicate your voice with little effort. These extended recordings also give the AI more material to work with than, say, a 15-second Instagram reel.
- Recorded calls from old data breaches
Some bad actors may turn to leaked call center recordings or hacked apps to get voice samples. They buy these clips online, extract the audio, and use it to create clones. Since the recordings are from real calls, the cloned voice sounds natural in similar contexts, making the scam feel more believable.
- Direct manipulation
If scammers can’t find your voice online, they go straight to the source and try to get you to speak. They may call while pretending to be a survey company, bank, or delivery service confirming an appointment. Often, they’ll ask questions that force you to answer in full sentences or repeat specific phrases.
Types of AI voice scams
Scammers often cycle through a range of tactics rather than stick to a single trick. Below are the most common types of AI voice scams you’ll see in the wild.
- Emergency impersonation (“help me!”) scams
These scams use a cloned voice of someone close to you — a child, partner, parent, or sibling — to fake an emergency. The caller typically sounds frantic, cranking up Acting 101 theatrics with uncontrollable sobbing, shaky whispers, or background noises like sirens and yelling to push you into acting fast.
The storyline is usually familiar as well: arrested, kidnapped, or in an accident. Others play it coy with the ever-vague “I can’t talk freely right now.” No matter the tale, it always ends with the scammer demanding fast payment and that you keep it quiet.
- Business and CEO impersonation scams
In these scams, bad actors pretend to be a company executive — usually a CEO, CFO, or senior manager — to trick employees into carrying out “pressing” tasks. The caller usually sounds calm and authoritative while making routine-sounding requests like approving payments, moving funds, sharing login credentials, or sending confidential documents.
The sneakier scammers do their homework and name-drop or slip in internal information scraped from company websites, press releases, LinkedIn, or past breaches to make the request less suspicious. Since the task is framed as top-priority and coming from higher-ups, employees often comply immediately.
- Financial, crypto, and investment scams
Scammers clone the voice of someone you’re likely to trust, such as a bank officer, financial advisor, or a public-facing figure like a crypto influencer, in these scams. They might claim there’s an urgent issue with your account, offer “exclusive” investment opportunities, or pitch time-sensitive deals.
To sell the story, they often throw in jargon, fake case numbers, or bogus statistics — painting the situation as urgent or a once-in-a-lifetime opportunity. The goal is to push you into transferring funds, moving crypto, sharing credentials, or approving account changes.
- Voice-authentication bypass attempts
Unlike other AI voice cloning scams that target victims directly, these ones go after banks, customer support hotlines, or account recovery services — pretending to be the victim. Here, scammers use cloned voices to answer security prompts, repeat passphrases, or even chat with a human agent to bypass voice-based identity verification.
Since voice checks are rarely used on their own, scammers typically turn to voice cloning only after stealing other personal information, such as usernames and passwords. The cloned voice is the last step that helps them cruise through voice-based security checks.
- AI phone-call scams
These scams are entirely fake phone calls where the caller’s voice is fully AI-generated to sound human. You might expect stilted, robotic speech, but modern AI-synthesized voices can be surprisingly natural and conversational. The AI can pause, shift tone, or add filler words just like a real person.
Common angles include claims of unpaid taxes, tech support issues, suspicious account activity, or mounting debts. From the scammer’s side, AI audio makes mass calling easy and flexible. They can make hundreds of calls, and each one can be tailored to its target.
How AI voice scams unfold step-by-step
Different AI voice scams may use different tricks and tactics, but they usually still follow the same basic playbook. Here’s how they typically look in action.
Step 2: They clone the voice using AI tools
Next, scammers feed the audio into voice-cloning software. The AI model then analyzes your vocal patterns like pitch, cadence, pronunciation, and inflection — essentially everything that makes you sound like you. From there, it generates a realistic synthetic version of your voice.
Step 3: They create a believable story
With the cloned voice in hand, scammers move on to designing the scenario and scripting the call — usually something urgent, dramatic, and distressing. Some classic angles include being stranded in a foreign country, arrested for a minor offense, involved in a car accident, or even kidnapped.
Step 4: They call or send a voice message
The message is then delivered via a live phone call, voicemail, or voice note on platforms like WhatsApp or Telegram. Real-time calls crank up the pressure and cut down thinking time while voice messages give the victim the chance to replay the audio, driving the point home. Either way, the familiar voice lowers suspicion and makes the message feel authentic.
Step 5: They ask for urgent money or sensitive data
The final stretch is the info or money extraction. This is when scammers push for immediate action like transferring funds, sharing login credentials, or sending confidential files. Urgency is the secret sauce at this stage, with victims told there’s no time to verify, call back, or even think things through.
Signs that a call might be AI-generated
AI-generated voice calls aren’t always easy to sniff out, but they do tend to have subtle inconsistencies that give them away.
Here are some signs a call may be AI-generated:
- Strange pauses or unnatural rhythm: pauses or start-stops that feel abrupt, misplaced, or calculated;
- Perfect pronunciation without emotion: the voice remains impeccably clear with little to no trembling or breathiness in supposedly emotional moments;
- Overly formal or robotic tone: the caller avoids slang and contractions, giving the impression of trying a little too hard to sound normal;
- Mismatched background noise: crackling static, looped audio, or total silence, even as the caller claims to be moving around;
- Delayed replies: short, consistent delays before each reply, even when the speech is otherwise fluent;
- Pressure, urgency, or secrecy: the caller demands immediate action, discourages any form of verification, and insists on secrecy;
- Refusal to switch to video: the caller dodges live video, refuses call-back verification, or balks at third-party confirmation with creative excuses like a broken camera.
How to protect yourself from AI voice scams
AI voice scams count on you acting fast and without thinking things through. The best defense is to stay calm, verify requests, and make full use of security tools.
- Create a family safe word
A simple but effective way to verify identity is to use a shared safe word known only to close family members. If someone calls claiming to be in trouble, they must provide the secret word before you jump into action. Make sure to choose a word or phrase that’s hard to guess and not publicly available online — obvious choices like street names or pet names won’t cut it.
- Verify through another channel
Don’t just go off a single call or voice message, even if the voice sounds familiar. Instead, take a moment to actually cross-check and verify the caller’s identity. Take a deep breath and hang up, then text, video call, or phone the person directly to confirm the call is genuine. Even the most urgent request will survive a quick check.
- Limit how much of your voice you post online
Be selective about what you share on TikTok, Instagram, and similar platforms. Clear, uninterrupted speech — like long monologues or Q&As — is prime material for fraudsters. That said, even short clips, stories, and reels can be scraped, manipulated, and reused. It’s safest to assume anything public can be copied, so set your profiles to private or limit followers to those you know.
- Don’t answer unknown calls with long greetings
Don’t open your call with scripted introductions like “Hello, this is [your name] from XYZ company speaking.” Better yet, let unknown callers make the first move and speak before you. Otherwise, malicious actors could record these openings and reuse them to train or fine-tune voice clones.
- Strengthen your account security
You might not be able to completely prevent fraudsters from copying your voice, but you can reduce the potential damage a cloned or misused voice can cause by shoring up your account security.
Start with these basic steps:
- Enable MFA (Multi-factor Authentication) — especially for vital accounts like email, banking, and cloud services — to add another layer of verification;
- Avoid voice-based authentication whenever possible or add an extra verification step to confirm identity;
- Use strong, unique passwords by combining upper and lowercase letters, numbers, and special characters, and use a
password manager to store them securely.
Use security tools for extra protection
No tools can block AI voice scams entirely, but the right ones can help minimize potential fallout. For an all-in-one security and privacy solution, check out Surfshark One.
Here’s how it can provide an extra layer of protection:
- Surfshark Alert: notifies you if your personal info appears in data breaches or leaks, helping you stay on guard against voice scams that might exploit your data to sound believable;
- Surfshark Antivirus: helps block malware, phishing links, and spyware that scammers might use alongside AI voice scams to steal your accounts or personal info;
- Surfshark VPN (Virtual Private Network): encrypts your internet traffic and masks your IP (Internet Protocol) address, making it harder for scammers to target you or abuse your data to seem more convincing.
What to do if you’ve been targeted
If you suspect you’re dealing with an AI voice scam, act fast to shut it down and minimize the damage.
- Stop communicating
First, end the call or stop replying immediately, even if the person sounds urgent or desperate. Don’t bother explaining, arguing, or testing them — scammers count on keeping you engaged so they can pile on the pressure and extract more information or money. Any extra interaction only gives them more opportunities to exploit you.
- Verify the person’s identity
If something sounds even slightly off, take it as a sign that you should go to the source directly. Verify through a separate, trusted channel: call the person on a number you already have, message them through an existing chat, or use the official website or app. For banks or similar institutions, a quick in-person visit is the safest.
- Report the scam attempt
Let the platform where the scam occurred know — whether that’s your phone carrier, messaging app, social network, or email provider. For scams involving financial information, threats, or impersonation, contact your local law enforcement or consumer protection agency. In the US, the FTC (Federal Trade Commission) and the FBI’s IC3 (Internet Crime Complaint Center) handle these reports.
- Change security settings if needed
If you shared any info — even minor details like names — during a suspicious interaction, assume it could be used against you. Take the initiative to secure your accounts: change passwords, enable 2FA (Two-factor Authentication), review recent login activity, and remove any unfamiliar devices. If banking or payment details came up, contact your bank to flag potential fraud.
- Activate breach monitoring tools
Tools like Surfshark Alert let you know if your personal information ends up online after a data leak incident. This means you can promptly take necessary actions like changing compromised passwords or enabling 2FA. It also helps you stay ahead of AI voice scams that might try to use your leaked info to pass off as the real deal.
AI voice scams in the news
From real-world cases to artificial intelligence experts raising alarms, AI voice scams are a regular fixture in the news.
Let’s run through some ways AI voice scams made headlines recently.
Tips to reduce your digital voice footprint
Once your voice is online, you have very little say over where it ends up and how it’s used. That’s why the best move is to limit how much of your voice is publicly available.
A few simple habits can help:
- Limit audio content on social media: avoid posting videos where your voice is clearly isolated, and opt for captions or background music instead
- Simplify voicemail recordings: switch to a generic greeting or keep custom messages short, neutral, and free of emotional cues or identifying details;
- Clean up old content: check past uploads on platforms like Instagram, TikTok, or YouTube and delete, archive, or restrict anything with clear, uninterrupted audio;
- Tighten privacy settings on social apps: limit who can view, download, share, or remix your content and disable search engine indexing.
Don’t fall for a fake voice
AI voice scams are extremely tricky as scammers can imitate real voices with shocking accuracy with just a few seconds of samples and free online tools. That’s why it’s more important than ever to stay cautious and keep an eye out for warning signs.
Better yet, take extra precautions to protect yourself and minimize potential damage. Use safe words, keep your voice off public sites, and double-check calls from unknown numbers. For added protection, consider Surfshark One — which includes Surfshark Alert, Antivirus, VPN, and more.
More additional info HERE
Data and info derived / lifted from Surfshark with permission
The following 1 user says Thank You to jasonX for this post:1 user says Thank You to jasonX for this post
• harlan4096
|
Users browsing this thread: 1 Guest(s)
|
|
Welcome
|
You have to register before you can post on our site.
|
|
Birthdays
|
|
Today's Birthdays
|
|
No birthdays today.
|
|
Upcoming Birthdays
|
(44)gapedDow
|
(38)snorydar
|
(46)qaqapeti
|
(44)battsourIonix
|
(43)CedricSek
|
(38)Charlesfibre
|
(43)artmaGoork
|
|
Online Staff
|
| There are no staff members currently online. |
|

|