Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesLogical SecuritySecurity & Business Resilience

AI: Fraudster’s greatest weapon and a company’s greatest defense

By David Divitt
cyber attack

Image from Pixabay

September 11, 2023

Security leaders have all received a phishing attempt before. An email or text from your boss, appearing legitimate at first, asking you to do something out of the ordinary for them — from sending over documents to buying them gift cards. By now, many workers have developed a watchful eye for these attempted scams and can spot one of the many telltale signs of someone trying to defraud them from a mile away. But what if they receive a phone or video call from someone who looks, and sounds, exactly like their boss? How likely is it that they’ll think twice before doing what they ask?

For many employees, the honest answer is “unlikely” — and that’s what fraud actors are counting on, now that artificial intelligence (AI) has worked its way into their toolkits. Though fraud may have previously been a manual effort, often by a network of criminals, the accessibility and power of modern AI models now allow a single actor to execute fraud at a greater scale (and far more convincingly) than ever before, and near-effortlessly at that. From casting a wide net with mass bot attacks to using deepfakes to effectively target individuals, fraudsters now have more powerful tools at their disposal and pose a historic risk to unprepared companies.

Thankfully, they’re not the only ones that can use AI — and while it’s not a “silver bullet” against fraud, AI-powered fraud defense systems are key to thwarting some of the most daunting scam methods to date. Let’s dive a little deeper into what this looks like in practice.

The modern threat landscape, brought to you by AI

Fraud is far from new — having taken a variety of forms throughout recorded history — but the explosion of methods that fraudsters have at their fingertips is, and many of the threats facing businesses and individuals today come courtesy of the newfound pervasiveness of AI. A significant reason for this is the extent to which AI enables fraudsters to take an automated, hands-free approach to pursue their victims, often requiring little to no effort to conduct once the groundwork is laid. Some fraudulent uses for AI, such as AI-powered online template generators for forging ID documents, may not be as individually effective as targeted attacks or custom-made fake IDs – but they don’t necessarily need to be. Even a minuscule success rate still results in free victory for the actors behind them, and allows the schemes to be directed at vastly more potential victims. 

However, AI’s dubious potential only grows scarier from there. In many cases, it’s used to probe for weaknesses in businesses’ fraud defenses, seeking out vulnerabilities that a regular person would likely miss; with these tools constantly on the hunt for an unguarded entry point, it’s clear that maintaining a static strategy for warding them off is hardly sufficient in the long run. But in still other cases, it can be used to adapt and impersonate a person’s likeness or voice with remarkable accuracy. 

Deepfakes, in their many flavors, are becoming cheap, easy to use, and unsettlingly effective in duping anyone from ordinary consumers to employees with significant internal access; most importantly, they’re quite difficult to filter out without specialized tools to verify identity and liveness. All of the above fraud methods – as well as the myriad other forms AI-powered fraud can take — present a serious threat without a dynamic and adaptable series of defense tools guarding against them. Fraud can happen in any form and at any stage of the customer journey, making single-layer and inflexible defenses insufficient. 

Making the double-edged sword work for your business

The good news, however, is that AI isn’t inherently evil: despite its nefarious uses, it can also be employed as a defense against itself. Verifying user identity, for example, can come down to the discernment of minuscule details — whether determining the legitimacy of an ID document or working out if the person on the other end of the line is who they say they are. Even fake IDs used to access restricted sites, or purchase restricted goods, can be checked with an AI-based verification tool much more accurately than a human eye can. With a tool as refined as AI in the hands of criminals, many have found themselves needing to fight fire with fire to stand a chance.

As ironclad as a solid AI-powered defense can be, it’s important to remember that fraudsters are constantly analyzing defense tactics and adapting their attacks to stay one step ahead. As such, it’s essential to keep up with a regularly-updated strategy, as companies that leave theirs to grow stale are sure to fall victim to an iteration of fraud that’s already far surpassed their abilities to catch it. Proactivity is crucial: by the time a fraud shield can be reactively adjusted, the damage will have already been done.

While avoiding scaring customers off with unnecessary friction is critical, it’s equally important to not be scared of introducing a bit of friction for the sake of combatting evolving fraud threats. The key is finding the right point in the customer journey at which to inject it, when to ramp it up, and when to scale it back. The menace of identity fraud is ever-present and ever-changing, but with investments in the right technology, smart use of data and risk signals, and a dynamic approach to fraud prevention, it doesn’t have to impact your business — let alone ruin it.

KEYWORDS: artificial intelligence (AI) Artificial Intelligence (AI) Security deepfakes fraud fraud prevention threat landscape

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

David Divitt is the Senior Director of Fraud Prevention and Experience at Veriff.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Black computer screen with multicolored text

    75% of organizations say phishing poses the greatest AI risk

    See More
  • cybersecurity

    How to select a cybersecurity framework to protect your greatest assets: People, property and data

    See More
  • education-security-4freepik1170x658.jpg

    The hacker stole my homework — the education industry faces its greatest test

    See More

Events

View AllSubmit An Event
  • November 14, 2024

    Best Practices for Integrating AI Responsibly

    ON DEMAND: Discover how artificial intelligence is reshaping the business landscape. AI holds immense potential to revolutionize industries, but with it comes complex questions about its risks and rewards.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing