{"id":1930,"date":"2025-11-05T15:24:49","date_gmt":"2025-11-05T18:24:49","guid":{"rendered":"https:\/\/bnftec.com\/?p=1930"},"modified":"2025-11-12T15:34:56","modified_gmt":"2025-11-12T18:34:56","slug":"clonagem-de-voz-por-ia-o-novo-golpe-digital","status":"publish","type":"post","link":"https:\/\/bnftec.com\/en\/clonagem-de-voz-por-ia-o-novo-golpe-digital\/","title":{"rendered":"AI-powered voice cloning: the new digital scam"},"content":{"rendered":"<p class=\"has-black-color has-text-color has-link-color wp-elements-aa5e366e75ac32b2f5690e518350bf19\">Imagine receiving a call with the voice of someone you know, down to the identical pauses.<br>On the other end, the person urgently asks for help, money, or a password. You recognize the voice and believe them.<br>But in reality, it&#039;s artificial intelligence talking to you.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/11\/ChatGPT-Image-3-de-nov.-de-2025-22_26_08-1024x683.png\" alt=\"\" class=\"wp-image-1931\" style=\"width:704px;height:auto\" srcset=\"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/11\/ChatGPT-Image-3-de-nov.-de-2025-22_26_08-1024x683.png 1024w, https:\/\/bnftec.com\/wp-content\/uploads\/2025\/11\/ChatGPT-Image-3-de-nov.-de-2025-22_26_08-300x200.png 300w, https:\/\/bnftec.com\/wp-content\/uploads\/2025\/11\/ChatGPT-Image-3-de-nov.-de-2025-22_26_08-768x512.png 768w, https:\/\/bnftec.com\/wp-content\/uploads\/2025\/11\/ChatGPT-Image-3-de-nov.-de-2025-22_26_08-18x12.png 18w, https:\/\/bnftec.com\/wp-content\/uploads\/2025\/11\/ChatGPT-Image-3-de-nov.-de-2025-22_26_08.png 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-c29a36c4a02cf2912a62637701b3de29\">This is the new digital scam that is gaining traction in Brazil and around the world: <strong>AI voice cloning<\/strong>, one of the most sophisticated forms of <strong>social engineering<\/strong> already registered.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-a31bb35237f35f21dd7a2d526651d9ef\" id=\"h-o-que-e-a-clonagem-de-voz-por-ia\"><strong>What is AI-powered voice cloning?<\/strong><\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-e2b51ec0e56701376190890f4e838bf6\">THE <strong>voice cloning using artificial intelligence<\/strong> uses machine learning models to <strong>to reproduce the speech of a real person<\/strong>.<br>With just a few seconds of audio, it&#039;s possible to train an algorithm to replicate speech timbre, intonation, and rhythm\u2014with a high level of realism.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-d5d056a5aefcee0ae2a9f388ce633cb1\">What once required studios and advanced technology can now be done by anyone with access to... <strong>free voice generation tools<\/strong> available on the internet.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-999ba36aea979118d5a39bc86d678f24\" id=\"h-como-criminosos-usam-a-ia-em-golpes\"><strong>How criminals use AI in scams<\/strong><\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-cbe15376f4be91560d21c2c3d9cc51e9\">Criminals take advantage of this technology to commit crimes. <strong>fraud<\/strong> using <strong>cloned voices<\/strong>, generally with three main objectives:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-black-color has-text-color has-link-color wp-elements-738c12969aa0824fa8c1066afbb09d73\"><strong>Deceiving family members or work colleagues<\/strong>, pretending to be someone close to them asking for money or help.<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-397def57fc82f6365202519ae33b8fd2\"><strong>Simulate corporate connections<\/strong>, posing as executives or suppliers to approve transactions and grant access.<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-5014876e576339706b308e2ecc400374\"><strong>Stealing confidential information<\/strong>, inducing employees to share passwords, codes, or authorizations.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-2a866f56bb611994a1cb66818adf4d45\">These scams are highly effective because they exploit the <strong>Emotional factor and trust<\/strong> \u2014 pillars of social engineering.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-671793c7ce5d904cb57dd3d5e6c4b731\" id=\"h-como-o-golpe-chega-ate-voce\"><strong>How the scam reaches you<\/strong><\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-c755af62b1adc8300f6f481047869006\">The recordings used to clone voices can come from:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-black-color has-text-color has-link-color wp-elements-94849cac3f85765aeefe7f8a9991d53d\"><strong>Audio messages in chat applications<\/strong>;<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-7b96ea9f97587bdd2642dd22228d2410\"><strong>Recorded virtual meetings<\/strong>;<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-80c223c642d7a2d253bf5f2ece3f887a\"><strong>Videos posted on social media<\/strong>;<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-67458b4c6dbb6c2f9d72802ea79d8210\"><strong>Common telephone support services<\/strong>.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-d1177e028a207526c4b1d9085b177e57\">In other words, any voice content can become raw material for a scam.<br>And the more evidence the criminal has, <strong>The more realistic the copy, the better.<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-f88da8bbca41362a6edd124b41056ea4\" id=\"h-por-que-o-golpe-e-tao-perigoso-para-empresas\"><strong>Why is this scam so dangerous for businesses?<\/strong><\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-0152d3aa859bf9f44088d28fabcd6291\">In corporate environments, the risk goes far beyond improper transfers.<br>A criminal with access to a manager&#039;s voice can:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-black-color has-text-color has-link-color wp-elements-4c848142b6d6837b33b27eb22d8c23dd\">Request <strong>fake payments<\/strong> to finance departments;<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-1fff113e876c0e33ace677c96f169aa5\">Deceiving support teams and obtaining <strong>administrative access<\/strong>;<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-aa2c79ae1e2e4865c03fd66fa4832142\">Recording fake messages to cause harm <strong>the company&#039;s reputation<\/strong>.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-b2ea18cd67ffa2030fa2494c4e23404c\">All of this <strong>without directly hacking into systems<\/strong> \u2014 simply manipulating people with an artificially convincing voice.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-7d7e3431b1569d8d868aef2e55f576ee\" id=\"h-como-se-proteger-de-golpes-com-voz-clonada\"><strong>How to protect yourself from voice impersonation scams<\/strong><\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-01d1dfe0859b6dc0c31cf444450a65f2\">Prevention starts with <strong>awareness and well-defined internal processes<\/strong>.<br>Check out the main best practices recommended by BNF:<\/p>\n\n\n\n<ul class=\"wp-block-list has-black-color has-text-color has-link-color wp-elements-a53547e180335060cc06ea8d40c200ca\">\n<li class=\"has-black-color has-text-color has-link-color wp-elements-5e98a41429d9fa3fded491c6f0085d91\"><strong>Confirm information through more than one channel.<\/strong>If you receive a suspicious call, confirm it via text message, email, or video.<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-964df300556a43769106ff8c6ba7517d\"><strong>Train teams regularly.<\/strong> about new forms of fraud and social engineering.<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-f0da7ec38896c267ec1b70f29f54acb0\"><strong>Establish validation protocols.<\/strong> for financial authorizations or access to systems.<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-f72b6ed1f083f558a081aa2e47e17a4b\"><strong>Avoid publicly sharing professional audio recordings.<\/strong>, especially in non-corporate environments.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-713a93bd55f24395d1b05dd8a20e2580\" id=\"h-o-papel-da-tecnologia-e-da-vigilancia-continua\"><strong>The role of technology and continuous surveillance<\/strong><\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-9b8d34b365ed467735033554c0f51b47\">Tools <strong>24\/7 monitoring<\/strong>, <strong>vulnerability management<\/strong> and <strong>security policies<\/strong> They help identify suspicious behavior and prevent social engineering attacks from causing real harm.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-5503beae37421d13c0b12b07d3d43d3a\">In the <strong>BNF Technology<\/strong>we agreed <strong>human intelligence and advanced technology<\/strong> To protect businesses from emerging threats, including AI-based scams.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-5cfd52330b184de31315a4922100f635\" id=\"h-conclusao\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-e21860cc7f9dd03f08321305befb0c03\">Voice cloning shows that the boundary between the real and the digital is becoming increasingly blurred.<br>But it also reinforces a simple truth:<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-90d1a01b5ad9316b0d7cd5a0eebcc570\"><strong>Information security starts with people.<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-4111595f5ebccb2d90b3ad5ddcded5e7\">With attention, training, and the right support, it&#039;s possible to transform the most vulnerable link in security\u2014the human element\u2014into... <strong>your greatest defense<\/strong>.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Imagine receiving a call with the voice of someone you know, down to the identical pauses.<br \/>\nOn the other end, the person urgently asks for help, money, or a password. You recognize the voice and believe them.<br \/>\nBut in reality, it&#039;s artificial intelligence talking to you.<\/p>","protected":false},"author":22,"featured_media":1953,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_joinchat":[],"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1930","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sem-categoria"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Clonagem de voz por IA: o novo golpe digital - BNF Cyber Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bnftec.com\/en\/clonagem-de-voz-por-ia-o-novo-golpe-digital\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Clonagem de voz por IA: o novo golpe digital\" \/>\n<meta property=\"og:description\" content=\"Imagine receber uma liga\u00e7\u00e3o com a voz de algu\u00e9m conhecido, at\u00e9 as pausas id\u00eanticas. Do outro lado, a pessoa pede ajuda, dinheiro ou uma senha \u201ccom urg\u00eancia\u201d. Voc\u00ea reconhece a voz e acredita. Mas na verdade, \u00e9 uma intelig\u00eancia artificial falando com voc\u00ea.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bnftec.com\/en\/clonagem-de-voz-por-ia-o-novo-golpe-digital\/\" \/>\n<meta property=\"og:site_name\" content=\"BNF Cyber Security\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-05T18:24:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-12T18:34:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/11\/ChatGPT-Image-3-de-nov.-de-2025-22_26_08-1-1024x683.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Emanuelle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emanuelle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/clonagem-de-voz-por-ia-o-novo-golpe-digital\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/clonagem-de-voz-por-ia-o-novo-golpe-digital\\\/\"},\"author\":{\"name\":\"Emanuelle\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#\\\/schema\\\/person\\\/4fb7ec6bdbccb8d44e61243032f08f78\"},\"headline\":\"Clonagem de voz por IA: o novo golpe digital\",\"datePublished\":\"2025-11-05T18:24:49+00:00\",\"dateModified\":\"2025-11-12T18:34:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/clonagem-de-voz-por-ia-o-novo-golpe-digital\\\/\"},\"wordCount\":610,\"publisher\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/clonagem-de-voz-por-ia-o-novo-golpe-digital\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/ChatGPT-Image-3-de-nov.-de-2025-22_26_08-1.png\",\"articleSection\":[\"Sem categoria\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/clonagem-de-voz-por-ia-o-novo-golpe-digital\\\/\",\"url\":\"https:\\\/\\\/bnftec.com\\\/clonagem-de-voz-por-ia-o-novo-golpe-digital\\\/\",\"name\":\"Clonagem de voz por IA: o novo golpe digital - BNF Cyber Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/clonagem-de-voz-por-ia-o-novo-golpe-digital\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/clonagem-de-voz-por-ia-o-novo-golpe-digital\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/ChatGPT-Image-3-de-nov.-de-2025-22_26_08-1.png\",\"datePublished\":\"2025-11-05T18:24:49+00:00\",\"dateModified\":\"2025-11-12T18:34:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/clonagem-de-voz-por-ia-o-novo-golpe-digital\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bnftec.com\\\/clonagem-de-voz-por-ia-o-novo-golpe-digital\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/clonagem-de-voz-por-ia-o-novo-golpe-digital\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/ChatGPT-Image-3-de-nov.-de-2025-22_26_08-1.png\",\"contentUrl\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/ChatGPT-Image-3-de-nov.-de-2025-22_26_08-1.png\",\"width\":1536,\"height\":1024,\"caption\":\"Imagine receber uma liga\u00e7\u00e3o com a voz de algu\u00e9m conhecido, at\u00e9 as pausas id\u00eanticas. Do outro lado, a pessoa pede ajuda, dinheiro ou uma senha \u201ccom urg\u00eancia\u201d. Voc\u00ea reconhece a voz e acredita. Mas na verdade, \u00e9 uma intelig\u00eancia artificial falando com voc\u00ea.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/clonagem-de-voz-por-ia-o-novo-golpe-digital\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/bnftec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Clonagem de voz por IA: o novo golpe digital\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#website\",\"url\":\"https:\\\/\\\/bnftec.com\\\/\",\"name\":\"BNF Cyber Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bnftec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#organization\",\"name\":\"BNF Cyber Security\",\"url\":\"https:\\\/\\\/bnftec.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Modo_de_isolamento-1.png\",\"contentUrl\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Modo_de_isolamento-1.png\",\"width\":222,\"height\":89,\"caption\":\"BNF Cyber Security\"},\"image\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#\\\/schema\\\/person\\\/4fb7ec6bdbccb8d44e61243032f08f78\",\"name\":\"Emanuelle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/792d5e8b2b9ab7d0521b1cecde23bd1addedf10933d0bce80d24a2492453eeba?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/792d5e8b2b9ab7d0521b1cecde23bd1addedf10933d0bce80d24a2492453eeba?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/792d5e8b2b9ab7d0521b1cecde23bd1addedf10933d0bce80d24a2492453eeba?s=96&d=mm&r=g\",\"caption\":\"Emanuelle\"},\"url\":\"https:\\\/\\\/bnftec.com\\\/en\\\/author\\\/emanuelle-bnftec\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Clonagem de voz por IA: o novo golpe digital - BNF Cyber Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bnftec.com\/en\/clonagem-de-voz-por-ia-o-novo-golpe-digital\/","og_locale":"en_US","og_type":"article","og_title":"Clonagem de voz por IA: o novo golpe digital","og_description":"Imagine receber uma liga\u00e7\u00e3o com a voz de algu\u00e9m conhecido, at\u00e9 as pausas id\u00eanticas. Do outro lado, a pessoa pede ajuda, dinheiro ou uma senha \u201ccom urg\u00eancia\u201d. Voc\u00ea reconhece a voz e acredita. Mas na verdade, \u00e9 uma intelig\u00eancia artificial falando com voc\u00ea.","og_url":"https:\/\/bnftec.com\/en\/clonagem-de-voz-por-ia-o-novo-golpe-digital\/","og_site_name":"BNF Cyber Security","article_published_time":"2025-11-05T18:24:49+00:00","article_modified_time":"2025-11-12T18:34:56+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/11\/ChatGPT-Image-3-de-nov.-de-2025-22_26_08-1-1024x683.png","type":"image\/png"}],"author":"Emanuelle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Emanuelle","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bnftec.com\/clonagem-de-voz-por-ia-o-novo-golpe-digital\/#article","isPartOf":{"@id":"https:\/\/bnftec.com\/clonagem-de-voz-por-ia-o-novo-golpe-digital\/"},"author":{"name":"Emanuelle","@id":"https:\/\/bnftec.com\/#\/schema\/person\/4fb7ec6bdbccb8d44e61243032f08f78"},"headline":"Clonagem de voz por IA: o novo golpe digital","datePublished":"2025-11-05T18:24:49+00:00","dateModified":"2025-11-12T18:34:56+00:00","mainEntityOfPage":{"@id":"https:\/\/bnftec.com\/clonagem-de-voz-por-ia-o-novo-golpe-digital\/"},"wordCount":610,"publisher":{"@id":"https:\/\/bnftec.com\/#organization"},"image":{"@id":"https:\/\/bnftec.com\/clonagem-de-voz-por-ia-o-novo-golpe-digital\/#primaryimage"},"thumbnailUrl":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/11\/ChatGPT-Image-3-de-nov.-de-2025-22_26_08-1.png","articleSection":["Sem categoria"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/bnftec.com\/clonagem-de-voz-por-ia-o-novo-golpe-digital\/","url":"https:\/\/bnftec.com\/clonagem-de-voz-por-ia-o-novo-golpe-digital\/","name":"Clonagem de voz por IA: o novo golpe digital - BNF Cyber Security","isPartOf":{"@id":"https:\/\/bnftec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bnftec.com\/clonagem-de-voz-por-ia-o-novo-golpe-digital\/#primaryimage"},"image":{"@id":"https:\/\/bnftec.com\/clonagem-de-voz-por-ia-o-novo-golpe-digital\/#primaryimage"},"thumbnailUrl":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/11\/ChatGPT-Image-3-de-nov.-de-2025-22_26_08-1.png","datePublished":"2025-11-05T18:24:49+00:00","dateModified":"2025-11-12T18:34:56+00:00","breadcrumb":{"@id":"https:\/\/bnftec.com\/clonagem-de-voz-por-ia-o-novo-golpe-digital\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bnftec.com\/clonagem-de-voz-por-ia-o-novo-golpe-digital\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bnftec.com\/clonagem-de-voz-por-ia-o-novo-golpe-digital\/#primaryimage","url":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/11\/ChatGPT-Image-3-de-nov.-de-2025-22_26_08-1.png","contentUrl":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/11\/ChatGPT-Image-3-de-nov.-de-2025-22_26_08-1.png","width":1536,"height":1024,"caption":"Imagine receber uma liga\u00e7\u00e3o com a voz de algu\u00e9m conhecido, at\u00e9 as pausas id\u00eanticas. Do outro lado, a pessoa pede ajuda, dinheiro ou uma senha \u201ccom urg\u00eancia\u201d. Voc\u00ea reconhece a voz e acredita. Mas na verdade, \u00e9 uma intelig\u00eancia artificial falando com voc\u00ea."},{"@type":"BreadcrumbList","@id":"https:\/\/bnftec.com\/clonagem-de-voz-por-ia-o-novo-golpe-digital\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/bnftec.com\/"},{"@type":"ListItem","position":2,"name":"Clonagem de voz por IA: o novo golpe digital"}]},{"@type":"WebSite","@id":"https:\/\/bnftec.com\/#website","url":"https:\/\/bnftec.com\/","name":"BNF Cyber Security","description":"","publisher":{"@id":"https:\/\/bnftec.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bnftec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/bnftec.com\/#organization","name":"BNF Cyber Security","url":"https:\/\/bnftec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bnftec.com\/#\/schema\/logo\/image\/","url":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/07\/Modo_de_isolamento-1.png","contentUrl":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/07\/Modo_de_isolamento-1.png","width":222,"height":89,"caption":"BNF Cyber Security"},"image":{"@id":"https:\/\/bnftec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bnftec.com\/#\/schema\/person\/4fb7ec6bdbccb8d44e61243032f08f78","name":"Emanuelle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/792d5e8b2b9ab7d0521b1cecde23bd1addedf10933d0bce80d24a2492453eeba?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/792d5e8b2b9ab7d0521b1cecde23bd1addedf10933d0bce80d24a2492453eeba?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/792d5e8b2b9ab7d0521b1cecde23bd1addedf10933d0bce80d24a2492453eeba?s=96&d=mm&r=g","caption":"Emanuelle"},"url":"https:\/\/bnftec.com\/en\/author\/emanuelle-bnftec\/"}]}},"_links":{"self":[{"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/posts\/1930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/comments?post=1930"}],"version-history":[{"count":15,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/posts\/1930\/revisions"}],"predecessor-version":[{"id":1955,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/posts\/1930\/revisions\/1955"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/media\/1953"}],"wp:attachment":[{"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/media?parent=1930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/categories?post=1930"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/tags?post=1930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}