  {"id":472,"date":"2025-04-01T11:53:16","date_gmt":"2025-04-01T15:53:16","guid":{"rendered":"https:\/\/www.montclair.edu\/phish-files\/?p=472"},"modified":"2025-04-01T11:53:16","modified_gmt":"2025-04-01T15:53:16","slug":"ai-scams-april-first","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/phish-files\/2025\/04\/01\/ai-scams-april-first\/","title":{"rendered":"AI scams on April 1st? This bot lies on purpose!"},"content":{"rendered":"<p><span style=\"font-weight: 400\">April 1st is all about harmless pranks and good-natured fun, but do you know who <\/span><em><strong>really<\/strong><\/em><span style=\"font-weight: 400\"> loves tricking people? Cybercriminals. And with AI-powered scams on the rise, it\u2019s easier than ever to fall for a convincing fake.<\/span><\/p>\n<h2>AI Scams: Fooling More Than Just the Gullible<\/h2>\n<p><span style=\"font-weight: 400\">Cybercriminals now use AI to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Clone voices \u2013 They might sound <\/span><em>just like<\/em><span style=\"font-weight: 400\"> a friend or professor.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Fake emails and messages \u2013 AI makes phishing attempts scarily realistic.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Deepfake videos \u2013 Can you trust that urgent message?<\/span><\/li>\n<\/ul>\n<h2>Don\u2019t Get Tricked! Stay Safe With These Tips:<\/h2>\n<ul>\n<li style=\"font-weight: 400\"><strong>Verify before you trust<\/strong><span style=\"font-weight: 400\"> \u2013 If something sounds <\/span><em><span style=\"font-weight: 400\">too weird<\/span><\/em><span style=\"font-weight: 400\"> or <\/span><em><span style=\"font-weight: 400\">too urgent<\/span><\/em><span style=\"font-weight: 400\">, confirm it another way (call the person directly).<\/span><\/li>\n<li style=\"font-weight: 400\"><strong>Watch for odd wording<\/strong><span style=\"font-weight: 400\"> \u2013 AI-generated messages can be eerily close to normal but often feel <\/span><em><span style=\"font-weight: 400\">just a little off<\/span><\/em><span style=\"font-weight: 400\">.<\/span><\/li>\n<li style=\"font-weight: 400\"><strong>Be skeptical of unexpected requests<\/strong><span style=\"font-weight: 400\"> \u2013 If someone asks for money, gift cards, or sensitive info\u2014pause and think before you act.<\/span><\/li>\n<li style=\"font-weight: 400\"><strong>Enable multi-factor authentication (MFA)<\/strong><span style=\"font-weight: 400\"> \u2013 Even if a scammer gets your password, MFA adds an extra layer of security.<\/span>\n<ul>\n<li><a href=\"https:\/\/www.montclair.edu\/information-technology\/duo-mfa-enrollment-usage-guide\/\">Duo MFA Enrollment &amp; Usage Guide<\/a><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/www.montclair.edu\/information-technology\/student-multifactor-authentication-faqs\/\">Student Multi Factor Authentication FAQs<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This April Fools\u2019, don\u2019t let cybercriminals have the last laugh. Stay sharp, stay skeptical, and if you spot something suspicious, report it to the <a href=\"https:\/\/www.montclair.edu\/phish-files\/\">Phish Files<\/a><\/span><span style=\"font-weight: 400\">! To report to the <a href=\"https:\/\/www.montclair.edu\/phish-files\/\">Phish Files<\/a><\/span><span style=\"font-weight: 400\"> use the <a href=\"https:\/\/www.montclair.edu\/information-technology\/security\/pab\/\">Knowbe4 PAB button<\/a><\/span><span style=\"font-weight: 400\">\u00a0or forward the email to <\/span><a href=\"mailto:phishfiles@montclair.edu\">phishfiles@montclair.edu<\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>April 1st is all about harmless pranks and good-natured fun, but do you know who really loves tricking people? Cybercriminals. And with AI-powered scams on the rise, it\u2019s easier than ever to fall for a convincing fake. AI Scams: Fooling More Than Just the Gullible Cybercriminals now use AI to: Clone voices \u2013 They might [&hellip;]<\/p>\n","protected":false},"author":349,"featured_media":473,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-472","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/users\/349"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/comments?post=472"}],"version-history":[{"count":5,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/472\/revisions"}],"predecessor-version":[{"id":478,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/472\/revisions\/478"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media\/473"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media?parent=472"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/categories?post=472"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/tags?post=472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}