253.777.0763    Get SUPPORT

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 26 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Managed Service Information Google IT Management Evernote Computer Fan Internet Two-factor Authentication Miscellaneous Cybersecurity Avoiding Downtime File Sharing Outlook Router Cache Start Menu Office 365 Business Continuity How To Windows 10 Cloud Skype Server Efficiency Managed IT Services Value Hosted Computing Security Social Engineering Vulnerability Google Drive Network Government Managed Service Provider Content Management IT Plan Password Virtualization Emergency Telephone Systems Browser Spam Blocking Computers Hardware Website Business Windows 10 Practices Data Recovery Redundancy Hiring/Firing NIST Communication Cryptocurrency Phishing Data Breach Workplace Tips Privacy Communications Business Intelligence eWaste Productivity Automation Unsupported Software Windows 7 Facebook Netflix Managed IT Net Neutrality Recycling BYOD Alert Artificial Intelligence Apps Employer-Employee Relationship Innovation Tip of the Week Gadgets Big Data Smart Tech Technology Hackers Smart Office Network Security Remote Monitoring Backup Quick Tips VPN Online Shopping Software Tips Company Culture Managing Stress Cybercrime Credit Cards Windows VoIP HIPAA Travel HaaS IBM Saving Money Leadership Best Practices Internet of Things Small Business BDR Budget Apple Botnet Email Wi-Fi FCC Chrome Bandwidth Hosted Solutions Settings Servers Data Protection Sports Data Backup Blockchain Samsung Business Computing App IT Services Android Malware Word Encryption Money Smartphones User Tips Data Security Internet Exlporer Save Money Nanotechnology Tech Term Identity Theft Operating System Audit Public Cloud Law Enforcement Mobile Device Management Managed IT Services Frequently Asked Questions Comparison Electronic Medical Records Business Management Health Safety Microsoft Office Specifications HBO Training OneNote Productivity Infrastructure Spam Bring Your Own Device Remote Work Virtual Assistant Paperless Office Update Cast Current Events Upgrade Connectivity Downtime Flash Software Relocation CES Addiction Windows Server 2008 Cloud Computing Document Management Microsoft Office Social Media Mobile Devices Networking Smartphone The Internet of Things Private Cloud Computer Outsourced IT Passwords Marketing Workers Digital Signature Entertainment Collaboration IT Support Remote Worker Data Files Screen Mirroring Ransomware Applications Data Storage

Newsletter Sign Up