{"id":271780,"date":"2024-01-24T06:37:11","date_gmt":"2024-01-24T11:37:11","guid":{"rendered":"https:\/\/sftarticles.wpenginepowered.com\/es\/?p=325260"},"modified":"2025-07-01T17:10:14","modified_gmt":"2025-07-02T00:10:14","slug":"fake-emails-will-become-increasingly-believable-due-to-ai","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/fake-emails-will-become-increasingly-believable-due-to-ai\/","title":{"rendered":"Fake emails will become increasingly believable due to AI"},"content":{"rendered":"\n<p>It&#8217;s likely that you&#8217;ve experienced this: you log in to your email and then proceed to check your inbox. Now, you have to navigate through dozens of somewhat &#8220;suspicious&#8221; emails, many of which will prompt you to check the location of a &#8220;supposed package&#8221; you had ordered. And so it goes every day.<\/p>\n\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"Gmail\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-m\/p\/39def43a-99eb-11e6-80e4-00163ed833e7\/498173641\/gmail-logo\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Gmail<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/gmail.en.softonic.com\/android?ex=RAMP-1640.0\" target=\"_self\" rel=\"noopener noreferrer\">DOWNLOAD<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/gmail.en.softonic.com\/android?ex=RAMP-1640.0\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n\n\n\n<p>However, what now may seem like clear scam attempts, may not be so in the near future. The rise of generative artificial intelligence will make everything much more <strong>complicated<\/strong>. At least that&#8217;s what the National Cyber Security Centre (NCSC) predicts.<\/p>\n\n\n\n<p><strong>Phishing<\/strong> is a technique used to obtain confidential information from other people (passwords, credit cards, etc). It is most commonly used in emails, which pretend to be from <strong>banks<\/strong> or <strong>well-known companies<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2024\/01\/chatgpt-phishing-1024x576-1-1024x576.jpg\" alt=\"\" class=\"wp-image-271783\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2024\/01\/chatgpt-phishing-1024x576-1-1024x576.jpg 1024w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2024\/01\/chatgpt-phishing-1024x576-1-300x169.jpg 300w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2024\/01\/chatgpt-phishing-1024x576-1-768x433.jpg 768w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2024\/01\/chatgpt-phishing-1024x576-1-800x450.jpg 800w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2024\/01\/chatgpt-phishing-1024x576-1-664x374.jpg 664w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2024\/01\/chatgpt-phishing-1024x576-1-238x134.jpg 238w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2024\/01\/chatgpt-phishing-1024x576-1-436x246.jpg 436w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2024\/01\/chatgpt-phishing-1024x576-1-370x208.jpg 370w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2024\/01\/chatgpt-phishing-1024x576-1-304x170.jpg 304w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2024\/01\/chatgpt-phishing-1024x576-1-150x84.jpg 150w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2024\/01\/chatgpt-phishing-1024x576-1.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>According to what we can read in <a href=\"https:\/\/www.theguardian.com\/technology\/2024\/jan\/24\/ai-scam-emails-uk-cybersecurity-agency-phishing\" target=\"_blank\" rel=\"noopener nofollow\" title=\"The Guardian\">The Guardian<\/a>, generative technology is reaching such a level of sophistication that it will make phishing messages increasingly difficult to detect. The effectiveness of these lies in <strong>their way of deceiving<\/strong>: the more authentic the email appears, the easier it will be to lure victims.<\/p>\n\n\n\n<p>According to the NCSC, generative AI is already being used to create more believable &#8220;<strong>lures<\/strong>&#8221; by not containing the grammatical errors that usually give away phishing attacks. The NCSC&#8217;s warnings coincide with the release of new guidelines from the British government, which encourages companies to <strong>protect themselves<\/strong> against the growing rise of cyber attacks.<\/p>\n\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"Gmail\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-m\/p\/39def43a-99eb-11e6-80e4-00163ed833e7\/498173641\/gmail-logo\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Gmail<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/gmail.en.softonic.com\/android?ex=RAMP-1640.0\" target=\"_self\" rel=\"noopener noreferrer\">DOWNLOAD<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/gmail.en.softonic.com\/android?ex=RAMP-1640.0\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s likely that you&#8217;ve experienced this: you log in to your email and then proceed to check your inbox. Now, you have to navigate through dozens of somewhat &#8220;suspicious&#8221; emails, many of which will prompt you to check the location of a &#8220;supposed package&#8221; you had ordered. And so it goes every day. However, what &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/en\/fake-emails-will-become-increasingly-believable-due-to-ai\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Fake emails will become increasingly believable due to AI&#8221;<\/span><\/a><\/p>\n","protected":false},"author":9211,"featured_media":271782,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":1},"categories":[1015],"tags":[],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-271780","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/271780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9211"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=271780"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/271780\/revisions"}],"predecessor-version":[{"id":315091,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/271780\/revisions\/315091"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/271782"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=271780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=271780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=271780"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=271780"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=271780"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=271780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}