253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, January 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Encryption Gmail Infrastructure Work/Life Balance Information Website Workforce Virtual Assistant Software Telephone Systems Windows Server 2008 Business Malware Word Comparison Business Management Network Security Authentication Data Breach Camera Network Managed IT Services Shortcuts Microsoft Office Software as a Service Smartwatch Email How To Windows 10 Collaboration Redundancy Chrome Mobile Devices Paperless Office Cloud Business Continuity Apps Efficiency Small Business Privacy Administrator Patch Management Spam Internet Two-factor Authentication Computers Windows Data Management Microsoft Trending Human Resources Solid State Drive Phishing Multi-Factor Security PDF Data Computer Care Cloud Computing Social Engineering HBO Holiday Mobile Device Management Technology Telecommuting History Workplace Tips Keyboard Windows 10 Cybercrime Servers Automation IT Management Vulnerability Nanotechnology Wi-Fi Communication Server Data Backup Hackers Scam BDR YouTube Unsupported Software Twitter Password Recycling Avoiding Downtime Google Apps Tip of the week USB Content Management Save Money Remote Work Communications IT Plan App End of Support Remote Monitoring Botnet iPhone Data Recovery Data Storage OneNote Money Connectivity Sports Machine Learning Gadgets File Sharing Disaster Recovery Company Culture Supercomputer Security Cameras Android Fraud Telephone System VPN Tech Term Budget Amazon Government Tip of the Week Password Management Blockchain Smartphone Managed IT Productivity Legal Alert Data loss Cybersecurity Best Practices Identity Theft Google Miscellaneous Recovery Amazon Web Services Facebook Operating System Business Intelligence Access Control Computer Bring Your Own Device Router Voice over Internet Protocol Smartphones Sync Google Drive Workers Windows 7 Telephony Google Docs Big Data Managed Service Hardware Upgrade Enterprise Content Management Spam Blocking Private Cloud Applications VoIP Public Cloud Office 365 Law Enforcement Hosted Solutions Outsourced IT Internet exploMicrosoft Virtualization Artificial Intelligence Settings IT Services Security User Tips MSP Networking Managed IT Services Passwords Ransomware IT Consultant Employer-Employee Relationship Internet of Things Update Social Media Business Computing Backup Emails Bandwidth Saving Money Browser Innovation CES Thought Leadership Mobile Computing BYOD Data Protection Mobile Device Humor Data Security Firewall IT Support

Newsletter Sign Up