Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, September 22 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business computing Network Security Google Software Microsoft Malware Hackers Innovation Backup Smartphones Internet Data Tech Term Hardware Email Windows 10 Hosted Solutions Business Android Mobile Devices Browser Managed IT Services Small Business Alert VoIP Business Continuity Computer Smartphone Office IT Services Data Backup Ransomware Outsourced IT Business Management Cloud Computing Computers Disaster Recovery User Tips Artificial Intelligence Efficiency Cybercrime Law Enforcement Productivity Miscellaneous Communications Network Telephone Systems Productivity How To Money Passwords Router Chrome Collaboration Cybersecurity Social Media Data Recovery Communication Internet of Things Password Applications Facebook Virtualization Managed IT Services Windows Workplace Tips Upgrade Work/Life Balance Windows 10 Health App Office 365 Social Engineering Gadgets Saving Money Quick Tips Bring Your Own Device Spam Data Protection Save Money HaaS Office Tips Holiday Server Mobile Device Management Two-factor Authentication IT Support Microsoft Office Connectivity Hacking Phishing Private Cloud Data Breach Wi-Fi IT Support Data Security Word Google Drive Automation Vulnerability Apps Paperless Office Settings Marketing History Information Entertainment BYOD USB Value Content Management Data Storage Firewall Networking Battery Managed Service Business Intelligence Virtual Assistant OneNote Blockchain PDF Employer-Employee Relationship IT Management Identity Theft Keyboard Charger Remote Computing Redundancy Update Spam Blocking Infrastructure Patch Management Avoiding Downtime Encryption Managed Service Provider Flexibility Sports IT Plan Cleaning Government Legal Operating System Scam VPN Worker Big Data Mobility Automobile Unsupported Software Computer Care Public Cloud Remote Monitoring BDR Managed IT Comparison Data Management Samsung Website CES Electronic Medical Records Training Mobile Device Windows 7 End of Support Bandwidth Outlook Google Apps Television Search Botnet Specifications Computer Accessories Emails Amazon Web Services Nanotechnology Instant Messaging Safe Mode Skype Voice over Internet Protocol Apple Leadership Virtual Reality Wireless Internet Remote Work Practices Vendor Management Video Games Audiobook HVAC Solid State Drive Flash Recovery Recycling Internet exploMicrosoft Wiring Machine Learning Frequently Asked Questions Workers Emergency Addiction Public Computer How to Meetings Travel Digital Signature Bluetooth Online Shopping Troubleshooting Smart Tech Loyalty Start Menu iPhone Save Time Worker Commute Wire Hosted Computing Enterprise Content Management Audit eWaste Smart Technology Advertising Current Events Education Unified Threat Management YouTube Excel Relocation Cache User Error Black Market MSP Millennials IT solutions Physical Security Evernote SaaS Telephone System Tools Multi-Factor Security HIPAA Credit Cards Experience Inventory Monitor Scalability Password Management Computer Fan Sync Criminal Two Factor Authentication Knowledge Computing Infrastructure Mobile Computing Tip of the week Password Manager File Sharing Data loss Workforce Risk Management Smart Office Wireless Charging Wireless Devices Downtime Trending Human Resources Hiring/Firing webinar Fraud Music Access Control NIST The Internet of Things Google Docs Network Congestion Camera Politics Accountants Rootkit Best Practice Windows 10s Windows Server 2008 Business Mangement Humor Transportation Internet Exlporer Safety Augmented Reality Screen Mirroring Document Management HBO Cortana Books Thought Leadership Files Assessment Root Cause Analysis Staff Employer Employee Relationship Conferencing Software Tips Amazon Wearable Technology Information Technology Authentication Data storage Cryptocurrency FENG Telephony Techology Hybrid Cloud IT Consultant Users Telecommuting Content Servers Gmail Benefits Remote Worker Cast Twitter Thank You Webinar Congratulations CrashOverride WiFi Company Culture Compliance Managing Stress Regulation Printers

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

AgustinMMontgomery MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For
19 September 2018
You have to share this wonderful article about how to handle the mobile payments and speedypaper rev...
JohnSHarper Tip of the Week: Working from Google Home
18 September 2018
Sharing these type tips are very effective for the readers and working from Google home is no secret...
Jesse Icely Study Finds that 45% of Virtual Machines Would Run More Efficiently in the Cloud
13 September 2018
Study has been pivotal goal for the generations. It has been marked with https://www.rushmyessays.or...
Malcolm Curtis Why You’ll Want to Consider Hosted VoIP Telephony
11 September 2018
VoIP was a new technology that was launched in this country this was just amazing it need 5g to get ...
Nomlanga Leach Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database
08 September 2018
Marketing database was reveal this year by a hacker that was not good news this was happened many ti...