fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, April 20 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Backup Two-factor Authentication Upgrade Facebook Smartwatch How To Email Disaster Recovery Communication Spam Internet of Things BDR Network Access Control Paperless Office Blockchain Fraud Network Security Data Breach Private Cloud Help Desk Miscellaneous Network Congestion Social Media Voice over Internet Protocol Windows Mobile Device Management Wi-Fi HIPAA Managed IT Services Browser Cybersecurity Evernote Infrastructure Money Managed IT Microsoft Data Storage Ransomware Small Business Identity Theft Outsourced IT Net Neutrality Google Automation Apps HaaS User Tips Chrome WiFi Applications Avoiding Downtime IT Consultant Employer-Employee Relationship Phishing Cloud Computing Microsoft Office Redundancy Communications Smartphone Hybrid Cloud Productivity Start Menu Settings Connectivity Business Continuity FCC VPN Cleaning Privacy Thought Leadership Windows 10 Remote Monitoring Meetings Operating System Password Computer Care Firewall PDF Devices Law Enforcement Machine Learning Business Management Social Engineering Google Docs Website Cloud Malware Data Security Telephone System Technology Save Time Internet Emails Health IT Support Router Wireless Hardware Data Recovery Save Money Sports Networking Cryptomining Data Backup Mobile Device Keyboard Enterprise Content Management Office 365 Workplace Tips Display App Alert Artificial Intelligence Android IT Plan Virtualization Spam Blocking Unsupported Software Servers Computer Tech Term Public Cloud Update End of Support Virtual Assistant Server Quick Tips Telephone Systems IT Management IT Services HVAC Holiday Bring Your Own Device Software as a Service Specifications Word Staff Comparison Training Vulnerability Hosted Solutions Criminal Scam Unified Threat Management Business Computing Accountants Travel Solid State Drive Windows 7 Managed IT Services Mouse Best Practices History Innovation Content Management Information Efficiency Encryption Software iPhone Computers ISP Cybercrime Mobile Computing Data Business Human Resources Apple Passwords Humor BYOD eWaste Telephony Smartphones VoIP Data Protection Augmented Reality Bandwidth Tip of the Week Gadgets Business Intelligence Managed Service Wire Collaboration OneNote Security Google Drive Mobile Devices Data Management Hackers CES Legal Saving Money Botnet Government Credit Cards Flash Windows 10 Cryptocurrency

Newsletter Sign Up