{"id":2449,"date":"2026-02-11T08:20:50","date_gmt":"2026-02-11T07:20:50","guid":{"rendered":"https:\/\/enthec.com\/risks-of-ai-in-peoples-online-safety\/"},"modified":"2026-02-11T10:03:09","modified_gmt":"2026-02-11T09:03:09","slug":"risks-of-ai-in-peoples-online-safety","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/","title":{"rendered":"Risks of AI in people&#8217;s online safety"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The risks of AI are transforming the cybersecurity landscape at an unprecedented pace. While artificial intelligence offers revolutionary advances, it also presents <\/span><b>increasingly sophisticated threats that directly affect people&#8217;s online security.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">By 2026, the dangers of artificial intelligence have evolved dramatically, from autonomous agents capable of executing full-scale attacks to hyper-personalized phishing generated in seconds. In this comprehensive guide, we&#8217;ll analyze the most critical threats and the most effective protection strategies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At Enthec, we work with a preventive approach, based on early detection and the <\/span><b>actual reduction of the attack surface. In<\/b><span style=\"font-weight: 400;\"> this context, solutions like Qondar enable identifying exposed vulnerabilities, forgotten assets, and risks arising from AI use before they are exploited, providing a clear, continuous view of the current security state.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>How is the development of AI affecting people&#8217;s online safety?<\/h2>\n<p>The development of artificial intelligence (AI) is revolutionizing online security, t<strong>ransforming both opportunities and challenges in the digital realm. <\/strong>AI&#8217;s ability to process and analyze large volumes of data, identify patterns, and learn from them brings significant benefits. Still, it is also creating new vulnerabilities and threats that affect people.<br \/>\nOne of the most apparent aspects of AI&#8217;s positive impact on online security is the <strong>automation of threat detection.<\/strong> AI-based cybersecurity tools can monitor in real time, detect anomalous behavior, identify fraud attempts, and detect malicious attacks before they cause significant damage.<br \/>\nThis has <strong>dramatically improved incident response capabilities<\/strong> and reduced the time needed to neutralize threats. For individual users, this translates into better protection of their personal and financial data held by companies.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-2361 aligncenter\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/riesgos-ia.jpg\" alt=\"ai risks\" width=\"661\" height=\"372\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/riesgos-ia.jpg 661w, https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/riesgos-ia-300x169.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/riesgos-ia-350x197.jpg 350w\" sizes=\"(max-width: 661px) 100vw, 661px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3>New AI-Driven Threats<\/h3>\n<p>However, cybercriminals also leverage AI to <strong>improve their targeted attack tactics,<\/strong> which target a specific person rather than an organization.<br \/>\nThe creation of deepfakes, for example, uses <strong>AI algorithms to generate fake images, videos, or audio that are almost indistinguishable from the real thing<\/strong>. These deepfakes can be used to spread false information, impersonate people in critical situations, or even commit fraud and extortion. AI&#8217;s ability to replicate human voices has also led to highly convincing voice scams, in which scammers pose as family members or authority figures to trick their victims.<br \/>\nAnother significant risk is the <strong>exploitation of vulnerabilities in social networks.<\/strong> AI can analyze profiles and behaviors on these platforms to identify potential targets, collect personal information, and launch targeted attacks. AI-powered bots can also amplify disinformation campaigns and manipulate public opinion, affecting the security of personal data and the integrity of the information we consume.<br \/>\nTo mitigate these risks, users must adopt robust security practices. This includes <strong>ongoing education about emerging threats and verifying sources <\/strong>before sharing information.<br \/>\nUsing advanced security tools that integrate AI capabilities can provide a <strong>proactive defense against sophisticated attacks<\/strong>. In addition, being selective about the personal information shared online and adjusting privacy settings on social media can limit exposure to potential threats.<\/p>\n<p><span style=\"font-weight: 400;\">You might be interested in-&gt; <\/span><a href=\"https:\/\/enthec.com\/en\/the-relevance-of-artificial-intelligence-in-cybersecurity\/\"><span style=\"font-weight: 400;\">The relevance of artificial intelligence in cybersecurity<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h2><b>The 8 most relevant AI dangers in 2026<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Among the most relevant risks of Artificial Intelligence, we highlight the following.<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><b>Autonomous AI Agents<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The most sophisticated threat of 2026 is AI agents capable of autonomously executing complete attack cycles:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Automated recognition of vulnerable systems<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Exploitation of vulnerabilities without human intervention<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Dynamic adaptation to evade detection systems<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Machine-speed operation, exceeding human response capabilities<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">By replicating human voices, scammers can impersonate<\/span><b> trustworthy people. These<\/b><span style=\"font-weight: 400;\"> scams often involve posing as family members or colleagues to deceive their victims and obtain sensitive information or money. They can be extremely convincing and difficult to detect without the right tools.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This ability to fully automate represents a paradigm shift in cybersecurity, enabling attackers to launch sophisticated operations without in-depth technical knowledge.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on autonomous AI, access our post-&gt; <\/span><a href=\"https:\/\/enthec.com\/en\/the-future-of-autonomous-ai-challenges-and-opportunities-in-cybersecurity\/\"><span style=\"font-weight: 400;\">The future of autonomous AI: challenges and opportunities in cybersecurity<\/span><\/a><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><b>AI-generated hyper-personalized phishing<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><a href=\"https:\/\/enthec.com\/en\/phishing-what-is-it-and-how-many-types-are-there\/\"><span style=\"font-weight: 400;\">P<\/span><span style=\"font-weight: 400;\">hishing<\/span><\/a><span style=\"font-weight: 400;\"> has evolved radically by 2026. AI allows us to create <\/span><b>customized attacks in seconds with near-perfect realism.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Cybercriminals are using AI to automatically create official-looking documents, bypassing traditional security filters and employing <\/span><a href=\"https:\/\/enthec.com\/en\/social-engineering-attacks-on-senior-executives\/\"><span style=\"font-weight: 400;\">social engineering<\/span><\/a><span style=\"font-weight: 400;\"> techniques so advanced that they mimic genuine communication patterns.<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><b>Malware via WhatsApp<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">WhatsApp has become one of the most dangerous attack vectors in 2026:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lack of security filters compared to corporate email<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Circulation of malicious documents, images, and links without prior analysis<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compromised devices turned into espionage tools<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Exponential risk for public figures and sensitive processes, such as elections<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\">\n<h3><b>Deepfakes and disinformation<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/enthec.com\/en\/deepfakes-what-they-are-and-how-to-detect-them\/\"><span style=\"font-weight: 400;\">deepfakes<\/span><\/a><span style=\"font-weight: 400;\"> have reached an alarming level of sophistication and are being used in critical processes such as remote job selection.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These synthetic contents are also used for corporate fraud. Through fake videos of executives authorizing transactions, election manipulation and mass political disinformation, extortion using fabricated compromising content, and breaches of biometric facial authentication systems, this development calls into question the reliability of identity verification systems that we considered secure until recently.<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><b>Voice cloning with minimal samples<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Voice cloning technology in 2026 requires barely<\/span><b>seconds of audio to create convincing replays:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Telephone scams impersonating family members in emergency situations<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Corporate fraud through calls from fake executives<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Obtaining urgent bank transfers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compromise of voice authentication systems<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The ease with which a voice can be cloned has made this type of attack one of the most effective and difficult to prevent.<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><b>AI-powered ransomware<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/enthec.com\/en\/what-is-a-ransomware-attack-and-how-to-anticipate-it-with-advanced-monitoring\/\"><span style=\"font-weight: 400;\">ransomware<\/span><\/a><span style=\"font-weight: 400;\"> powered by AI has evolved to include capabilities that make it more devastating than ever.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The attacks are faster and harder to attribute to specific perpetrators, and small groups can scale up to massive operations using Ransomware-as-a-Service (RaaS). Experts confirm that ransomware will continue to rank among the top global threats, but now with exponentially greater capacity for damage, thanks to the integration of AI.<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><b>Data privacy issues<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Artificial intelligence systems require massive amounts of data for training and operation, leading to the indiscriminate collection of personal information without explicit consent or user knowledge<\/span><b>.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Companies that implement generative AI and language models are exposing sensitive customer and employee data through systems that can leak information via generated responses, creating unintentional privacy breaches.<\/span><\/p>\n<p><b>The risk is compounded by the misuse of personal data<\/b><span style=\"font-weight: 400;\">to train business models without compensation or authorization from the owners, the exposure of sensitive information in autonomous AI systems that make decisions without human supervision, and the lack of transparency about what data is collected, how it is processed, and with whom it is shared.<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><b>Intellectual property infringement<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Intellectual property infringement by AI has become one of the most complex and difficult legal risks to address. Generative AI models are being trained on copyrighted content without the original creators&#8217; authorization, including text, images, code, music, and artwork.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This creates multiple problems: the generation of content that infringes copyright by reproducing distinctive elements of protected works, sophisticated plagiarism through the creation of content that imitates styles and works of specific authors without attribution.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>How to protect yourself from AI risks<\/h2>\n<p>Protecting yourself from AI-related personal online security risks requires <strong>education, advanced tools, robust security practices, and collaboration.<\/strong><\/p>\n<h3>Education and Awareness<\/h3>\n<p>The foundation of good online security is education. <strong>Knowing the risks and how to deal with them is essential. <\/strong>People also need to stay informed about cybercriminals&#8217; latest tactics, including the use of AI.<br \/>\nParticipating in online courses and webinars, and reading blogs specializing in cybersecurity, are <strong>effective ways to stay current.<\/strong> Continuing education allows us to recognize warning signs and respond appropriately to threats.<\/p>\n<h3>Source and Authenticity Verification<\/h3>\n<p>One of the most significant risks today is\u00a0<span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\"><strong>the threat of deepfakes,<\/strong> which use AI to create content that appears<\/span>\u00a0real. To protect yourself, it&#8217;s crucial to always verify the authenticity of information before sharing or acting on it.<br \/>\nVerification tools, such as services that verify the authenticity of news and emails, can help <strong>identify and prevent deception.<\/strong><\/p>\n<h3>Use Advanced Security Tools<\/h3>\n<p>Numerous security tools use AI to provide <strong>advanced protection<\/strong>. These include antivirus software, malware detection programs, and mobile security apps. These tools can analyze behavior in real-time, detect suspicious patterns, and alert users to potentially dangerous activities.<br \/>\nIt&#8217;s essential\u00a0<span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\">to keep these<strong> tools up to date<\/strong><\/span>\u00a0to ensure they&#8217;re equipped to deal with the latest threats.<\/p>\n<h3>Protection of personal data<\/h3>\n<p>The protection of personal data is critical in today&#8217;s digital environment.<strong> People should be cautious about the information they share online.<\/strong> Setting your social media privacy settings to limit who can see and access personal information is essential.<br \/>\nIt is critical to use strong, unique passwords for each account and <strong>change them regularly.<\/strong> Additionally, using password managers can help maintain security without the need to remember multiple passwords.<\/p>\n<h3>Multi-Factor Authentication<\/h3>\n<p><a href=\"https:\/\/enthec.com\/en\/reasons-to-use-multi-factor-authentication-in-companies\/\"><span style=\"font-weight: 400;\">Multi-factor authentication (MFA)<\/span><\/a> adds an <strong>extra layer of security.<\/strong> In addition to a password, MFA requires a second factor of verification, such as a code sent to a mobile phone. This makes it difficult for attackers to access the accounts, even if they manage to obtain the password. Implementing MFA across all accounts is an effective way to increase security.<\/p>\n<h3><img decoding=\"async\" class=\"size-full wp-image-2363 aligncenter\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/mfa-peligros-ia.jpg\" alt=\"MFA for AI hazards\" width=\"661\" height=\"440\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/mfa-peligros-ia.jpg 661w, https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/mfa-peligros-ia-300x200.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/mfa-peligros-ia-350x233.jpg 350w\" sizes=\"(max-width: 661px) 100vw, 661px\" \/><\/h3>\n<h3>Constant monitoring<\/h3>\n<p>Constant monitoring of accounts and online activity can help quickly detect unusual behavior. <strong>Setting up alerts for suspicious activity,<\/strong> such as login attempts from unrecognized locations, allows you to act immediately.<br \/>\nSome services <strong>monitor the use of personal information on the dark web<\/strong> and alert users if their data is at risk.<\/p>\n<h3>Collaboration and communication<\/h3>\n<p>Collaboration and communication with friends, family, and colleagues about cybersecurity can help <strong>build a support network and share best practices<\/strong>. Discussing common threats and how to deal with them can raise collective awareness and reduce the risk of falling into cybercriminal traps.<\/p>\n<p>&nbsp;<\/p>\n<h2>Qondar helps you protect your data and digital assets from AI threats<\/h2>\n<p><a href=\"https:\/\/enthec.com\/en\/qondar\/\">Qondar <\/a>is the solution developed by <a href=\"https:\/\/enthec.com\/en\/\">Enthec<\/a> to <strong>protect people&#8217;s personal online information and digital assets.<\/strong><br \/>\nQondar <strong>monitors sensitive data, financial and patrimonial assets, and individual social profiles<\/strong> to detect public leaks of these assets and prevent their criminal or illegitimate use.<br \/>\nIf you want to <strong>protect your digital assets or those of your organization&#8217;s relevant members<\/strong><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\"><strong>\u00a0and avoid the dangers posed by<\/strong>\u00a0artificial intelligence to humans,\u00a0<a href=\"https:\/\/enthec.com\/en\/contact\/\" target=\"_blank\" rel=\"noopener\">contact us<\/a> to learn<\/span>\u00a0how Qondar can help.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The risks of AI are transforming the cybersecurity landscape at an unprecedented pace. While artificial intelligence offers revolutionary advances, it [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":2367,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[34,23,24,33],"class_list":["post-2449","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-ai","tag-qondar-en","tag-cybersecurity","tag-risks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Risks of AI in people - Enthec<\/title>\n<meta name=\"description\" content=\"Discover the most relevant AI risks in people&#039;s online safety and the keys to protect yourself \u27a1\ufe0f Find out more here!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risks of AI in people - Enthec\" \/>\n<meta property=\"og:description\" content=\"Discover the most relevant AI risks in people&#039;s online safety and the keys to protect yourself \u27a1\ufe0f Find out more here!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-11T07:20:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-11T09:03:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/riesgos-ia-personas-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"Risks of AI in people&#8217;s online safety\",\"datePublished\":\"2026-02-11T07:20:50+00:00\",\"dateModified\":\"2026-02-11T09:03:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/\"},\"wordCount\":1682,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/riesgos-ia-personas-scaled.jpg\",\"keywords\":[\"AI\",\"Qondar\",\"Cybersecurity\",\"Risks\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/\",\"url\":\"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/\",\"name\":\"Risks of AI in people - Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/riesgos-ia-personas-scaled.jpg\",\"datePublished\":\"2026-02-11T07:20:50+00:00\",\"dateModified\":\"2026-02-11T09:03:09+00:00\",\"description\":\"Discover the most relevant AI risks in people's online safety and the keys to protect yourself \u27a1\ufe0f Find out more here!\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/riesgos-ia-personas-scaled.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/riesgos-ia-personas-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Riesgos de la ia para las personas\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Risks of AI in people&#8217;s online safety\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Risks of AI in people - Enthec","description":"Discover the most relevant AI risks in people's online safety and the keys to protect yourself \u27a1\ufe0f Find out more here!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/","og_locale":"en_US","og_type":"article","og_title":"Risks of AI in people - Enthec","og_description":"Discover the most relevant AI risks in people's online safety and the keys to protect yourself \u27a1\ufe0f Find out more here!","og_url":"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2026-02-11T07:20:50+00:00","article_modified_time":"2026-02-11T09:03:09+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/riesgos-ia-personas-scaled.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"Risks of AI in people&#8217;s online safety","datePublished":"2026-02-11T07:20:50+00:00","dateModified":"2026-02-11T09:03:09+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/"},"wordCount":1682,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/riesgos-ia-personas-scaled.jpg","keywords":["AI","Qondar","Cybersecurity","Risks"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/","url":"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/","name":"Risks of AI in people - Enthec","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/riesgos-ia-personas-scaled.jpg","datePublished":"2026-02-11T07:20:50+00:00","dateModified":"2026-02-11T09:03:09+00:00","description":"Discover the most relevant AI risks in people's online safety and the keys to protect yourself \u27a1\ufe0f Find out more here!","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/riesgos-ia-personas-scaled.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/riesgos-ia-personas-scaled.jpg","width":2560,"height":1707,"caption":"Riesgos de la ia para las personas"},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/risks-of-ai-in-peoples-online-safety\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Risks of AI in people&#8217;s online safety"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/2449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=2449"}],"version-history":[{"count":2,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/2449\/revisions"}],"predecessor-version":[{"id":4549,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/2449\/revisions\/4549"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/2367"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=2449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=2449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=2449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}