Infracore LLC Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, November 17 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Network Security Google Business computing Malware Hackers Microsoft Software Data Innovation Internet Business Hardware Backup Smartphones Tech Term Hosted Solutions User Tips Email Browser Windows 10 VoIP Data Backup Business Continuity Computer Android Mobile Devices Productivity Managed IT Services Small Business Alert Workplace Tips Communications Business Management IT Services Ransomware Cloud Computing Outsourced IT Computers Disaster Recovery Miscellaneous Smartphone Data Recovery Chrome Office Managed IT Services Law Enforcement Cybercrime Network Communication Artificial Intelligence Efficiency Social Media Windows 10 How To Password Applications Facebook Virtualization Windows Telephone Systems Productivity Collaboration Cybersecurity Money Passwords Router Internet of Things Gadgets Social Engineering Office 365 Saving Money Quick Tips Upgrade Information Work/Life Balance IT Support Server Health App Vulnerability Microsoft Office BDR Hacking Spam Private Cloud Wi-Fi Data Protection Google Drive Mobile Device Management Automation Bring Your Own Device Save Money Two-factor Authentication Holiday Phishing Apps Keyboard Word Connectivity HaaS Data Security Office Tips IT Support Scam Data Breach Managed Service Provider Windows 7 Sports Big Data Telephone System Settings Comparison Computer Care Government Flexibility BYOD Website CES Legal Data Storage Mobility Automobile Samsung Electronic Medical Records Public Cloud Content Management Training OneNote Bandwidth Voice over Internet Protocol Entertainment Redundancy IT Management Spam Blocking Data Management Business Intelligence USB Value Avoiding Downtime Blockchain Servers Firewall Networking End of Support Mobile Device Identity Theft Paperless Office History IT Plan Update Operating System Encryption Marketing Infrastructure Employer-Employee Relationship Charger Patch Management Battery Unsupported Software Managed Service PDF VPN Remote Monitoring Virtual Assistant Cleaning Managed IT Worker Remote Computing Fraud Accountants Mouse Black Market Cast Business Mangement Hiring/Firing Outlook Staff Mobile Computing Music Monitor Botnet Cortana Thought Leadership Password Management Network Congestion File Sharing Politics Rootkit Scalability Skype Amazon Authentication Transportation Safety Emails Computing Infrastructure Employer Employee Relationship Solid State Drive Flash Telecommuting Smart Office Administrator Books Assessment Gmail Frequently Asked Questions Specifications Camera Wearable Technology Wireless Meetings Travel Google Apps NIST IT Consultant Augmented Reality Start Menu Amazon Web Services Nanotechnology Benefits Humor Internet Exlporer Computer Accessories Best Practice Audit Remote Work Practices Document Management Microchip Television Files Recovery Recycling Excel Digital Signature Data storage Workers Addiction Cryptocurrency Leadership Hybrid Cloud Remote Worker Vendor Management Information Technology Tools Online Shopping Smart Tech Techology IT solutions Users Physical Security Bluetooth Computer Fan Content Sync Hosted Computing Search Engine Emergency Public Computer eWaste Tip of the week Millennials Wireless Internet Warranty Troubleshooting Loyalty Search Data loss Cache Safe Mode Save Time Apple Multi-Factor Security HIPAA Wiring Instant Messaging Downtime Evernote HVAC Smart Technology Current Events Internet exploMicrosoft Virtual Reality Video Games The Internet of Things Audiobook Credit Cards Inventory Machine Learning Bing webinar WiFi Criminal iPhone Windows 10s Windows Server 2008 Workforce Wire Printer SaaS How to Screen Mirroring Password Manager HBO Trending Human Resources Unified Threat Management Experience Root Cause Analysis Wireless Charging Devices Enterprise Content Management Two Factor Authentication Knowledge Advertising Worker Commute MSP Risk Management FENG Telephony Access Control YouTube Help Desk Relocation User Error Conferencing Education Software Tips Google Docs Company Culture Software as a Service Compliance Twitter Managing Stress Webinar Regulation Printers CrashOverride Thank You Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

BessieLHuerta 8 Data Backup Terms You Should Know
15 November 2018
I can understand the importance of this content about the data backup and I think it will attract ma...
Constance Rowe Are You Intrigued By the Tech of CES 2018?
15 November 2018
An internal blog is intriguing for the storing of the information. The visitors of the https://www.b...
Leo Reid A Few Security Lessons Your Business Can Learn From Game of Thrones
07 November 2018
Few lessons of the learning have been consumed for the better range of the people. The sort of the i...
Risa Franklin Is a Data Backup Really That Necessary? In a Word: Yes
01 November 2018
Data protection is very important for us with we can get rid from various kinds of problems while ru...
Sybil Stephens Is a Data Backup Really That Necessary? In a Word: Yes
20 October 2018
Backup data for the word Microsoft is really needed that only some written material will be come to ...