{"id":7801,"date":"2024-08-02T14:18:25","date_gmt":"2024-08-02T14:18:25","guid":{"rendered":"https:\/\/trustpair.com\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/"},"modified":"2024-09-17T14:25:08","modified_gmt":"2024-09-17T14:25:08","slug":"deep-voice-une-technique-de-fraude-a-la-pointe-de-lia","status":"publish","type":"post","link":"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/","title":{"rendered":"Deep voice : une technique de fraude \u00e0 la pointe de l\u2019IA ?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Apr\u00e8s le Deep Fake et autres techniques de cybercriminalit\u00e9, le Deep voice a fray\u00e9 son chemin ces derni\u00e8res ann\u00e9es. Cette technique d&rsquo;escroquerie a d\u00e9fray\u00e9 la chronique en 2020 apr\u00e8s qu&rsquo;un directeur de banque ait \u00e9t\u00e9 victime d&rsquo;un deep voice \u00e0 35 millions de dollars. Bas\u00e9e sur l&rsquo;intelligence artificielle (IA), cette m\u00e9thode de manipulation de l&rsquo;audio est en recrudescence. De quoi s&rsquo;agit-il et comment faire pour s&rsquo;en pr\u00e9munir efficacement ? Trustpair vous r\u00e9pond dans cet article.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Le Deep Voice, une technique de fraude qui a d\u00e9fray\u00e9 la chronique<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Technologie utilis\u00e9e pour <\/span><b>simuler une voix gr\u00e2ce \u00e0 l&rsquo;intelligence artificielle (IA)<\/b><span style=\"font-weight: 400;\">, la Deep Voice a fait des \u00e9mules ces derni\u00e8res ann\u00e9es. En 2020, un directeur de banque a subi une arnaque aux \u00c9mirats arabes unis, subissant un <\/span><a href=\"https:\/\/www.numerama.com\/cyberguerre\/747708-le-deep-voice-ou-comment-lia-permet-des-attaques-par-la-voix.html\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">pr\u00e9judice financier de 35 millions de dollars<\/span><\/a><span style=\"font-weight: 400;\">. Le malfaiteur avait utilis\u00e9 cette technologie pour se faire passer pour le PDG d&rsquo;une entreprise au t\u00e9l\u00e9phone. Il avait alors sollicit\u00e9 l&rsquo;accord de la banque pour une acquisition et lui avait fait parvenir des mails \u00e9galement frauduleux.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Si cette affaire a fait grand bruit, notamment parce qu&rsquo;elle implique en r\u00e9alit\u00e9 une dizaine de personnes, il ne s&rsquo;agit pas de la premi\u00e8re en date. En effet, des pirates avaient d\u00e9j\u00e0 utilis\u00e9 la deep voice pour simuler la voix d&rsquo;un PDG dans une <\/span><a href=\"https:\/\/www.wsj.com\/articles\/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">entreprise allemande<\/span><\/a><span style=\"font-weight: 400;\">. Ils avaient alors demand\u00e9 au responsable de faire un virement de 220 000 \u20ac en urgence. Ayant cru reconna\u00eetre le timbre de voix de son sup\u00e9rieur au t\u00e9l\u00e9phone, la victime avait r\u00e9alis\u00e9 ce virement sans se m\u00e9fier.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">N&rsquo;h\u00e9sitez pas \u00e0 consulter nos astuces pour <a href=\"https:\/\/trustpair.fr\/blog\/vishing\/\">lutter contre le vishing<\/a> qui est justement un mix entre le phishing et la voix, un type d&rsquo;arnaque qui se fait le plus souvent au t\u00e9l\u00e9phone.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Qu&rsquo;est-ce que le deep voice ?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Le deep voice est une technique permettant de <\/span><b>reproduire fid\u00e8lement la voix d\u2019une personne vis\u00e9e<\/b><span style=\"font-weight: 400;\">. En r\u00e8gle g\u00e9n\u00e9rale, il s\u2019agit d\u2019usurper la voix d\u2019une personne influente, pour obtenir des avantages financiers. La victime ne se m\u00e9fie pas et ob\u00e9it alors aux demandes du cybercriminel. Cette technique d\u2019<\/span><a href=\"https:\/\/trustpair.fr\/blog\/usurpation-didentite-bancaire-comment-sen-proteger\/\"><span style=\"font-weight: 400;\">usurpation d\u2019identit\u00e9<\/span><\/a><span style=\"font-weight: 400;\"> peut avoir de lourdes cons\u00e9quences sur l\u2019entreprise.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cette technologie se base sur l\u2019intelligence artificielle, dans la lign\u00e9e du<\/span> <span style=\"font-weight: 400;\">Deep fake<\/span><span style=\"font-weight: 400;\"> qui est un\u00a0 enregistrement audio ou vid\u00e9o \u00e9galement modifi\u00e9 gr\u00e2ce \u00e0 l&rsquo;IA. Ce type de faux contenu, rendu cr\u00e9dible, a \u00e9galement de lourdes cons\u00e9quences.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Pour parvenir \u00e0 leurs fins, les criminels usent de stratag\u00e8mes toujours plus pointus. Ils utilisent notamment des podcasts d\u00e9j\u00e0 enregistr\u00e9s, des vid\u00e9os ou encore des passages d\u2019interview. De cette mani\u00e8re, ils parviennent \u00e0 restituer fid\u00e8lement la voix de la personne dont ils veulent usurper l\u2019identit\u00e9.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Comment faire face aux deep voices ?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">L&rsquo;un des probl\u00e8mes majeurs du Deep voice est qu&rsquo;il est assez simple \u00e0 mettre en place en pratique. Manipuler l&rsquo;audio est plus facile que de r\u00e9aliser de fausses vid\u00e9os. Cela explique pourquoi cette tendance risque de s&rsquo;accentuer dans les prochaines ann\u00e9es. Il convient donc de se renseigner sur ce nouveau type d&rsquo;attaque, afin de s&rsquo;en pr\u00e9munir. Les entreprises peuvent \u00e9galement se doter de nouvelles m\u00e9thodes d&rsquo;authentification, sans oublier de former leurs collaborateurs pour \u00e9viter qu&rsquo;ils ne soient victimes. En pratique, il est difficile aujourd&rsquo;hui de se fier uniquement \u00e0 un coup de fil pour authentifier une personne puisque la voix ne doit pas suffire \u00e0 faire confiance aveugl\u00e9ment \u00e0 son interlocuteur.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A titre d&rsquo;exemple, une entreprise pourrait mettre en place un double syst\u00e8me d&rsquo;authentification (\u00e0 l&rsquo;instar d&rsquo;une validation biom\u00e9trique), de sorte \u00e0 r\u00e9duire au maximum le niveau de risque. Se fier \u00e0 des mails ayant une allure officielle ne suffit \u00e9galement pas, surtout lorsqu&rsquo;on constate la<\/span><a href=\"https:\/\/trustpair.fr\/blog\/fraude-numerique-une-hausse-preoccupante\/\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">hausse du nombre de fraudes aux virements<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Bonnes pratiques pour \u00e9viter le deep voice<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Comment faire concr\u00e8tement pour \u00e9viter d\u2019\u00eatre victime d\u2019une technique de deep voice ? Voici quelques astuces pour vous pr\u00e9munir efficacement contre ce ph\u00e9nom\u00e8ne :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Communiquez en interne avec vos collaborateurs<\/b><span style=\"font-weight: 400;\">, surtout si vous avez un doute ou une suspicion sur une pratique de deep voice<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Dressez une cartographie des risques <\/b><span style=\"font-weight: 400;\">que vous prendrez soin de partager avec vos salari\u00e9s pour plus de transparence. En effet, n\u2019importe qui dans l\u2019entreprise peut un jour \u00eatre la victime d\u2019un cybercriminel, que ce soit dans le cadre d\u2019un deep voice ou de toute autre tentative de fraude<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Utilisez un syst\u00e8me informatique n\u00e9cessitant une double authentification forte ainsi qu\u2019une s\u00e9gr\u00e9gation des t\u00e2ches<\/b><span style=\"font-weight: 400;\">. L\u2019objectif est ici d\u2019apporter un maximum de s\u00e9curit\u00e9 dans la r\u00e9alisation des t\u00e2ches au quotidien. Une seule authentification peut permettre \u00e0 certaines personnes malveillantes d\u2019entrer dans le syst\u00e8me et d\u2019en tirer profit au d\u00e9triment des int\u00e9r\u00eats de l\u2019entreprise victime. Pour une double authentification r\u00e9ussie, vous pouvez par exemple choisir la<\/span><a href=\"https:\/\/trustpair.fr\/blog\/delegation-de-signature-en-entreprise-risques-responsabilite\/\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">double signature<\/span><\/a><span style=\"font-weight: 400;\"> ou le<\/span><a href=\"https:\/\/trustpair.fr\/blog\/principe-des-4-yeux-un-rempart-contre-la-fraude\/\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">principe des quatre yeux<\/span><\/a><span style=\"font-weight: 400;\"> afin de limiter les risques<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Prot\u00e9gez-vous efficacement de la fraude<\/b><span style=\"font-weight: 400;\"> en optant pour une solution technologique qui a fait ses preuves dans le temps. <\/span><span style=\"font-weight: 400;\">La <\/span><span style=\"font-weight: 400;\">solution <\/span><span style=\"font-weight: 400;\">Trustpair<\/span><span style=\"font-weight: 400;\"> est votre alli\u00e9 au quotidien pour automatiser les contr\u00f4les des donn\u00e9es tierces. Cela vous permet de vous d\u00e9charger de ces activit\u00e9s chronophages qui demandent du temps, tout en \u00e9vitant le risque d\u2019erreurs humaines pouvant co\u00fbter tr\u00e8s cher \u00e0 votre structure. Vous gagnez ainsi en s\u00e9curit\u00e9 et en productivit\u00e9.\u00a0<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Apr\u00e8s le Deep Fake et autres techniques de cybercriminalit\u00e9, le Deep voice a fray\u00e9 son chemin ces derni\u00e8res ann\u00e9es. Cette technique d&rsquo;escroquerie a d\u00e9fray\u00e9 la chronique en 2020 apr\u00e8s qu&rsquo;un directeur de banque ait \u00e9t\u00e9 victime d&rsquo;un deep voice \u00e0 35 millions de dollars. Bas\u00e9e sur l&rsquo;intelligence artificielle (IA), cette m\u00e9thode de manipulation de l&rsquo;audio [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7802,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[85],"tags":[],"class_list":["post-7801","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraude-virement"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Deep voice : une technique de fraude \u00e0 la pointe de l\u2019IA ? - Trustpair<\/title>\n<meta name=\"description\" content=\"Succ\u00e9dant au DeepFake, le Deep Voice utilise IA pour arnaquer ses victimes. Zoom sur cette technique de fraude \u00e0 la pointe de l\u2019IA.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deep voice : une technique de fraude \u00e0 la pointe de l\u2019IA ? - Trustpair\" \/>\n<meta property=\"og:description\" content=\"Succ\u00e9dant au DeepFake, le Deep Voice utilise IA pour arnaquer ses victimes. Zoom sur cette technique de fraude \u00e0 la pointe de l\u2019IA.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustpair\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-02T14:18:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-17T14:25:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustpair.com\/wp-content\/uploads\/deep-voice-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"593\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"trustpair_2438\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"trustpair_2438\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/\"},\"author\":{\"name\":\"trustpair_2438\",\"@id\":\"https:\/\/trustpair.com\/fr\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\"},\"headline\":\"Deep voice : une technique de fraude \u00e0 la pointe de l\u2019IA ?\",\"datePublished\":\"2024-08-02T14:18:25+00:00\",\"dateModified\":\"2024-09-17T14:25:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/\"},\"wordCount\":966,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/deep-voice-1.png\",\"articleSection\":[\"Fraude au virement\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/\",\"url\":\"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/\",\"name\":\"Deep voice : une technique de fraude \u00e0 la pointe de l\u2019IA ? - Trustpair\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/deep-voice-1.png\",\"datePublished\":\"2024-08-02T14:18:25+00:00\",\"dateModified\":\"2024-09-17T14:25:08+00:00\",\"description\":\"Succ\u00e9dant au DeepFake, le Deep Voice utilise IA pour arnaquer ses victimes. Zoom sur cette technique de fraude \u00e0 la pointe de l\u2019IA.\",\"breadcrumb\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/#primaryimage\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/deep-voice-1.png\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/deep-voice-1.png\",\"width\":1200,\"height\":593},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trustpair.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deep voice : une technique de fraude \u00e0 la pointe de l\u2019IA ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustpair.com\/fr\/#website\",\"url\":\"https:\/\/trustpair.com\/fr\/\",\"name\":\"Trustpair\",\"description\":\"Solution leader de pr\u00e9vention de la fraude au virement et de contr\u00f4le RIB fournisseurs\",\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustpair.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/trustpair.com\/fr\/#organization\",\"name\":\"Trustpair\",\"url\":\"https:\/\/trustpair.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/trustpair.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"width\":304,\"height\":73,\"caption\":\"Trustpair\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/trustpair.com\/fr\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\",\"name\":\"trustpair_2438\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"caption\":\"trustpair_2438\"},\"sameAs\":[\"http:\/\/trustpair.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deep voice : une technique de fraude \u00e0 la pointe de l\u2019IA ? - Trustpair","description":"Succ\u00e9dant au DeepFake, le Deep Voice utilise IA pour arnaquer ses victimes. Zoom sur cette technique de fraude \u00e0 la pointe de l\u2019IA.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/","og_locale":"fr_FR","og_type":"article","og_title":"Deep voice : une technique de fraude \u00e0 la pointe de l\u2019IA ? - Trustpair","og_description":"Succ\u00e9dant au DeepFake, le Deep Voice utilise IA pour arnaquer ses victimes. Zoom sur cette technique de fraude \u00e0 la pointe de l\u2019IA.","og_url":"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/","og_site_name":"Trustpair","article_published_time":"2024-08-02T14:18:25+00:00","article_modified_time":"2024-09-17T14:25:08+00:00","og_image":[{"width":1200,"height":593,"url":"https:\/\/trustpair.com\/wp-content\/uploads\/deep-voice-1.png","type":"image\/png"}],"author":"trustpair_2438","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"trustpair_2438","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/#article","isPartOf":{"@id":"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/"},"author":{"name":"trustpair_2438","@id":"https:\/\/trustpair.com\/fr\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034"},"headline":"Deep voice : une technique de fraude \u00e0 la pointe de l\u2019IA ?","datePublished":"2024-08-02T14:18:25+00:00","dateModified":"2024-09-17T14:25:08+00:00","mainEntityOfPage":{"@id":"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/"},"wordCount":966,"commentCount":0,"publisher":{"@id":"https:\/\/trustpair.com\/fr\/#organization"},"image":{"@id":"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/deep-voice-1.png","articleSection":["Fraude au virement"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/","url":"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/","name":"Deep voice : une technique de fraude \u00e0 la pointe de l\u2019IA ? - Trustpair","isPartOf":{"@id":"https:\/\/trustpair.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/#primaryimage"},"image":{"@id":"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/deep-voice-1.png","datePublished":"2024-08-02T14:18:25+00:00","dateModified":"2024-09-17T14:25:08+00:00","description":"Succ\u00e9dant au DeepFake, le Deep Voice utilise IA pour arnaquer ses victimes. Zoom sur cette technique de fraude \u00e0 la pointe de l\u2019IA.","breadcrumb":{"@id":"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/#primaryimage","url":"https:\/\/trustpair.com\/wp-content\/uploads\/deep-voice-1.png","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/deep-voice-1.png","width":1200,"height":593},{"@type":"BreadcrumbList","@id":"https:\/\/trustpair.com\/fr\/blog\/deep-voice-une-technique-de-fraude-a-la-pointe-de-lia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trustpair.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Deep voice : une technique de fraude \u00e0 la pointe de l\u2019IA ?"}]},{"@type":"WebSite","@id":"https:\/\/trustpair.com\/fr\/#website","url":"https:\/\/trustpair.com\/fr\/","name":"Trustpair","description":"Solution leader de pr\u00e9vention de la fraude au virement et de contr\u00f4le RIB fournisseurs","publisher":{"@id":"https:\/\/trustpair.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustpair.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/trustpair.com\/fr\/#organization","name":"Trustpair","url":"https:\/\/trustpair.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/trustpair.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","width":304,"height":73,"caption":"Trustpair"},"image":{"@id":"https:\/\/trustpair.com\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/trustpair.com\/fr\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034","name":"trustpair_2438","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","caption":"trustpair_2438"},"sameAs":["http:\/\/trustpair.com"]}]}},"_links":{"self":[{"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/posts\/7801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/comments?post=7801"}],"version-history":[{"count":0,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/posts\/7801\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/media\/7802"}],"wp:attachment":[{"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/media?parent=7801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/categories?post=7801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/tags?post=7801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}