{"id":1501,"date":"2026-01-10T21:18:54","date_gmt":"2026-01-10T14:18:54","guid":{"rendered":"https:\/\/agusarmanto.com\/?p=1501"},"modified":"2026-01-10T21:19:36","modified_gmt":"2026-01-10T14:19:36","slug":"vigilant-steps-to-secure-personal-data-from-ai-based-phishing-attacks","status":"publish","type":"post","link":"https:\/\/agusarmanto.com\/en\/vigilant-steps-to-secure-personal-data-from-ai-based-phishing-attacks","title":{"rendered":"Alert! Steps to Secure Personal Data from AI-Based Phishing Attacks"},"content":{"rendered":"<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>In 2026, hacking methods have become much more sophisticated thanks to the development of artificial intelligence (<em>Artificial Intelligence<\/em>). If in the past the attack <em>phishing<\/em> easily recognized by messy grammar or suspicious links, nowadays <strong>AI-based phishing<\/strong> being able to mimic the speech styles of people we know so perfectly.<\/p>\n\n\n\n<p>How can we stay safe in this increasingly challenging digital world? This article will explore practical steps to protect your personal data from AI.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-apa-itu-phishing-berbasis-ai\">What is AI-Based Phishing?<\/h2>\n\n\n\n<p><em>Phishing<\/em> AI-based fraud is a fraud technique where the perpetrator uses algorithms <em>Large Language Models<\/em> (LLM) to create messages, emails, or even voice (<em>deepfake<\/em>) which is very convincing. The goal remains the same: steal sensitive information such as passwords, credit card data, or personal identities.<\/p>\n\n\n\n<p>The advantage of AI for hackers is its ability to eliminate typos and adjust the context of the conversation based on our public data on social media.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-langkah-mengamankan-data-dari-serangan-ai\">Steps to Secure Data from AI Attacks<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-gunakan-autentikasi-dua-faktor-2fa-yang-kuat\">1. Use Strong Two-Factor Authentication (2FA)<\/h3>\n\n\n\n<p>Don't just rely on passwords. Enable <strong>Multi-Factor Authentication (MFA)<\/strong> on each of your important accounts (Email, Banking, Social Media).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Suggestion:<\/strong> Use an authenticator app such as Google Authenticator or a physical key (Yubikey) instead of SMS, as SMS codes can still be stolen through technical means <em>Driver's License Swapping<\/em>.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-verifikasi-melalui-jalur-komunikasi-lain\">2. Verification through other communication channels<\/h3>\n\n\n\n<p>If you receive an urgent message from an employer or family member requesting the transfer of money or sensitive data, <strong>don't believe it right away<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Steps:<\/strong> Do manual verification. Contact the person by phone or another messaging app to confirm if the message is really from them.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-waspadai-deepfake-audio-dan-video\">3. Beware of Deepfake Audio and Video<\/h3>\n\n\n\n<p>AI technology can now mimic the human voice with 99% accuracy. If you receive a call from a familiar person that sounds \u201coff\u201d or asks for suspicious things, try asking questions that only the two of you know (confidential family questions).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-periksa-header-email-dan-tautan-secara-detail\">4. Check Email Headers and Links in Detail<\/h3>\n\n\n\n<p>Even if the content of the email looks professional, the sender's email address can often be completely deceptive.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hover the cursor (<em>hover<\/em>) over the link without clicking on it to see the actual URL address.<\/li>\n\n\n\n<li>Check if the sender's domain matches that of the authorized company (e.g: <code>@company.com<\/code> not <code>@company-update.net<\/code>).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-batasi-informasi-di-media-sosial\">5. Limit Information on Social Media<\/h3>\n\n\n\n<p>AI gathers data from what you share publicly to create personalized fraud scenarios. Reduce sharing too much detailed information such as office location, names of family members, or specific hobbies on public profiles.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-apa-yang-harus-dilakukan-jika-sudah-terlanjur-klik\">What to do if you've already clicked?<\/h2>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Disconnect the Internet:<\/strong> Turn off Wi-Fi or mobile data immediately to prevent further data transmission.<\/li>\n\n\n\n<li><strong>Change Password:<\/strong> Replace <em>password<\/em> associated account via another secure device.<\/li>\n\n\n\n<li><strong>Scan Device:<\/strong> Use an up-to-date antivirus to make sure there are no <em>malware<\/em> which is installed automatically.<\/li>\n\n\n\n<li><strong>Report:<\/strong> If it is related to banking, contact the bank immediately to block access.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-kesimpulan\">Conclusion<\/h2>\n\n\n\n<p>Digital security in the age of AI is no longer about technicalities, but about vigilance and healthy skepticism. By implementing the steps above, you are one step ahead of the hackers. Remember, your personal data is your most valuable asset in the digital world.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>","protected":false},"excerpt":{"rendered":"<p>In 2026, hacking methods have become much more sophisticated thanks to the development of artificial intelligence. In the past, phishing attacks were easy<\/p>","protected":false},"author":1,"featured_media":1502,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-1501","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet"],"magazineBlocksPostFeaturedMedia":{"thumbnail":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722-150x150.jpg","medium":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722-300x300.jpg","medium_large":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722-768x768.jpg","large":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722.jpg","1536x1536":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722.jpg","2048x2048":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722.jpg","trp-custom-language-flag":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722-12x12.jpg","colormag-highlighted-post":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722-392x272.jpg","colormag-featured-post-medium":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722-390x205.jpg","colormag-featured-post-small":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722-130x90.jpg","colormag-featured-image":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722-800x445.jpg","colormag-default-news":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722-150x150.jpg","colormag-featured-image-large":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722-1024x600.jpg","colormag-elementor-block-extra-large-thumbnail":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722-1024x480.jpg","colormag-elementor-grid-large-thumbnail":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722-600x417.jpg","colormag-elementor-grid-small-thumbnail":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722-285x450.jpg","colormag-elementor-grid-medium-large-thumbnail":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722-575x198.jpg"},"magazineBlocksPostAuthor":{"name":"armant","avatar":"https:\/\/secure.gravatar.com\/avatar\/55e5a6dcbb4c3a5e6c85f92f09de4fdbbf64d6340a0b4784c64e88a53efee836?s=96&d=mm&r=g"},"magazineBlocksPostCommentsNumber":"0","magazineBlocksPostExcerpt":"Di tahun 2026, metode peretasan menjadi jauh lebih canggih berkat perkembangan kecerdasan buatan (Artificial Intelligence). Jika dulu serangan phishing mudah","magazineBlocksPostCategories":["Internet"],"magazineBlocksPostViewCount":217,"magazineBlocksPostReadTime":3,"magazine_blocks_featured_image_url":{"full":["https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722.jpg",1024,1024,false],"medium":["https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722-300x300.jpg",300,300,true],"thumbnail":["https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722-150x150.jpg",150,150,true]},"magazine_blocks_author":{"display_name":"armant","author_link":"https:\/\/agusarmanto.com\/en\/author\/armant"},"magazine_blocks_comment":5,"magazine_blocks_author_image":"https:\/\/secure.gravatar.com\/avatar\/55e5a6dcbb4c3a5e6c85f92f09de4fdbbf64d6340a0b4784c64e88a53efee836?s=96&d=mm&r=g","magazine_blocks_category":"<a href=\"#\" class=\"category-link category-link-5\">Internet<\/a>","yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.5 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Waspada! Langkah Mengamankan Data Pribadi dari Serangan Phishing Berbasis AI - Agus Armanto<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/agusarmanto.com\/en\/vigilant-steps-to-secure-personal-data-from-ai-based-phishing-attacks\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Waspada! Langkah Mengamankan Data Pribadi dari Serangan Phishing Berbasis AI\" \/>\n<meta property=\"og:description\" content=\"Di tahun 2026, metode peretasan menjadi jauh lebih canggih berkat perkembangan kecerdasan buatan (Artificial Intelligence). Jika dulu serangan phishing mudah\" \/>\n<meta property=\"og:url\" content=\"https:\/\/agusarmanto.com\/en\/vigilant-steps-to-secure-personal-data-from-ai-based-phishing-attacks\" \/>\n<meta property=\"og:site_name\" content=\"Agus Armanto\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-10T14:18:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-10T14:19:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"armant\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"armant\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Be vigilant! Steps to Secure Personal Data from AI-Based Phishing Attacks - Agus Armanto","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/agusarmanto.com\/en\/vigilant-steps-to-secure-personal-data-from-ai-based-phishing-attacks","og_locale":"en_US","og_type":"article","og_title":"Waspada! Langkah Mengamankan Data Pribadi dari Serangan Phishing Berbasis AI","og_description":"Di tahun 2026, metode peretasan menjadi jauh lebih canggih berkat perkembangan kecerdasan buatan (Artificial Intelligence). Jika dulu serangan phishing mudah","og_url":"https:\/\/agusarmanto.com\/en\/vigilant-steps-to-secure-personal-data-from-ai-based-phishing-attacks","og_site_name":"Agus Armanto","article_published_time":"2026-01-10T14:18:54+00:00","article_modified_time":"2026-01-10T14:19:36+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722.jpg","type":"image\/jpeg"}],"author":"armant","twitter_card":"summary_large_image","twitter_misc":{"Written by":"armant","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/agusarmanto.com\/waspada-langkah-mengamankan-data-pribadi-dari-serangan-phishing-berbasis-ai#article","isPartOf":{"@id":"https:\/\/agusarmanto.com\/waspada-langkah-mengamankan-data-pribadi-dari-serangan-phishing-berbasis-ai"},"author":{"name":"armant","@id":"https:\/\/agusarmanto.com\/#\/schema\/person\/5d92cda20538fdf49269fd2517bd9269"},"headline":"Waspada! Langkah Mengamankan Data Pribadi dari Serangan Phishing Berbasis AI","datePublished":"2026-01-10T14:18:54+00:00","dateModified":"2026-01-10T14:19:36+00:00","mainEntityOfPage":{"@id":"https:\/\/agusarmanto.com\/waspada-langkah-mengamankan-data-pribadi-dari-serangan-phishing-berbasis-ai"},"wordCount":475,"commentCount":0,"image":{"@id":"https:\/\/agusarmanto.com\/waspada-langkah-mengamankan-data-pribadi-dari-serangan-phishing-berbasis-ai#primaryimage"},"thumbnailUrl":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722.jpg","articleSection":["Internet"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/agusarmanto.com\/waspada-langkah-mengamankan-data-pribadi-dari-serangan-phishing-berbasis-ai#respond"]}]},{"@type":"WebPage","@id":"https:\/\/agusarmanto.com\/waspada-langkah-mengamankan-data-pribadi-dari-serangan-phishing-berbasis-ai","url":"https:\/\/agusarmanto.com\/waspada-langkah-mengamankan-data-pribadi-dari-serangan-phishing-berbasis-ai","name":"Be vigilant! Steps to Secure Personal Data from AI-Based Phishing Attacks - Agus Armanto","isPartOf":{"@id":"https:\/\/agusarmanto.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/agusarmanto.com\/waspada-langkah-mengamankan-data-pribadi-dari-serangan-phishing-berbasis-ai#primaryimage"},"image":{"@id":"https:\/\/agusarmanto.com\/waspada-langkah-mengamankan-data-pribadi-dari-serangan-phishing-berbasis-ai#primaryimage"},"thumbnailUrl":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722.jpg","datePublished":"2026-01-10T14:18:54+00:00","dateModified":"2026-01-10T14:19:36+00:00","author":{"@id":"https:\/\/agusarmanto.com\/#\/schema\/person\/5d92cda20538fdf49269fd2517bd9269"},"breadcrumb":{"@id":"https:\/\/agusarmanto.com\/waspada-langkah-mengamankan-data-pribadi-dari-serangan-phishing-berbasis-ai#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/agusarmanto.com\/waspada-langkah-mengamankan-data-pribadi-dari-serangan-phishing-berbasis-ai"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/agusarmanto.com\/waspada-langkah-mengamankan-data-pribadi-dari-serangan-phishing-berbasis-ai#primaryimage","url":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722.jpg","contentUrl":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722.jpg","width":1024,"height":1024,"caption":"mengamankan-phising-berbasis-ai"},{"@type":"BreadcrumbList","@id":"https:\/\/agusarmanto.com\/waspada-langkah-mengamankan-data-pribadi-dari-serangan-phishing-berbasis-ai#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/agusarmanto.com\/"},{"@type":"ListItem","position":2,"name":"Waspada! Langkah Mengamankan Data Pribadi dari Serangan Phishing Berbasis AI"}]},{"@type":"WebSite","@id":"https:\/\/agusarmanto.com\/#website","url":"https:\/\/agusarmanto.com\/","name":"Agus Armanto","description":"Technology Insights, Visual Inspiration, Travel, Sports, Modern Lifestyle.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/agusarmanto.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/agusarmanto.com\/#\/schema\/person\/5d92cda20538fdf49269fd2517bd9269","name":"armant","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/55e5a6dcbb4c3a5e6c85f92f09de4fdbbf64d6340a0b4784c64e88a53efee836?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/55e5a6dcbb4c3a5e6c85f92f09de4fdbbf64d6340a0b4784c64e88a53efee836?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/55e5a6dcbb4c3a5e6c85f92f09de4fdbbf64d6340a0b4784c64e88a53efee836?s=96&d=mm&r=g","caption":"armant"},"url":"https:\/\/agusarmanto.com\/en\/author\/armant"}]}},"jetpack_featured_media_url":"https:\/\/agusarmanto.com\/wp-content\/uploads\/2026\/01\/mengamankan-phising-berbasis-ai-1226722.jpg","_links":{"self":[{"href":"https:\/\/agusarmanto.com\/en\/wp-json\/wp\/v2\/posts\/1501","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/agusarmanto.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/agusarmanto.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/agusarmanto.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/agusarmanto.com\/en\/wp-json\/wp\/v2\/comments?post=1501"}],"version-history":[{"count":1,"href":"https:\/\/agusarmanto.com\/en\/wp-json\/wp\/v2\/posts\/1501\/revisions"}],"predecessor-version":[{"id":1503,"href":"https:\/\/agusarmanto.com\/en\/wp-json\/wp\/v2\/posts\/1501\/revisions\/1503"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/agusarmanto.com\/en\/wp-json\/wp\/v2\/media\/1502"}],"wp:attachment":[{"href":"https:\/\/agusarmanto.com\/en\/wp-json\/wp\/v2\/media?parent=1501"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/agusarmanto.com\/en\/wp-json\/wp\/v2\/categories?post=1501"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/agusarmanto.com\/en\/wp-json\/wp\/v2\/tags?post=1501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}