253.777.0763    Get SUPPORT

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, November 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Encryption Accountants HVAC Automation Content Management Outlook Productivity Unified Threat Management Files IT Management Mobile Devices Password Manager App End of Support The Internet of Things Mobile Computing Bandwidth Sports Data Breach Quick Tips Cast Training Managed IT Saving Money IT Support Comparison IBM Data Security Windows 7 Infrastructure Outsourced IT Servers Applications Workplace Tips Voice over Internet Protocol Technology Internet of Things Facebook Identity Theft Windows 10 Managed IT Services Chrome HIPAA Mobile Device Management eWaste Business Continuity Evernote Microsoft Office Virtual Assistant Google Docs Router Malware Network Security Start Menu Mouse OneNote Credit Cards Avoiding Downtime Cybersecurity Business Management How To Wire Settings Mobile Device Safety IT Services webinar Data Machine Learning Business Internet User Tips VoIP Miscellaneous Connectivity Update Security Productivity Redundancy Phishing Ransomware Save Money YouTube Fraud Blockchain Social Media Office 365 Flash FENG Internet Exlporer Cloud Computing Gadgets Upgrade BDR Spam Blocking Access Control Passwords Password Best Practices Operating System Managed Service Current Events Unsupported Software Software Wi-Fi Business Computing Electronic Medical Records Tech Term FCC Downtime Netflix Vulnerability Hybrid Cloud Frequently Asked Questions Keyboard Augmented Reality Windows 10 Windows Data Recovery Two-factor Authentication Information Telephone Systems Computer Fan Bring Your Own Device Thought Leadership Communications Google WiFi Value HaaS Specifications Devices Collaboration Hosted Solutions Android Apple Spam Office Word Private Cloud Email Enterprise Content Management Hiring/Firing Employer-Employee Relationship Title II Smartphone Criminal Scam VPN Government Innovation Networking Law Enforcement Help Desk Virtualization Authentication Network Computer Cybercrime Computers Backup Communication Server IT Plan Data Storage Efficiency Browser CES Health Business Intelligence Money Charger Travel Data Backup BYOD Smartphones Remote Monitoring Apps Software Tips Alert Microsoft Paperless Office Cloud Root Cause Analysis Tip of the Week Managed IT Services Artificial Intelligence Privacy Hardware Hackers Relocation Windows 10s Telephone System Small Business Google Drive MSP Data Protection Website Social Engineering Public Cloud

Newsletter Sign Up