Deepfakes: invisible threats and how to identify them