Infracore LLC Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, April 26 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business computing Google Hosted Solutions Productivity Network Security Microsoft Internet User Tips Data Malware Software Hackers Innovation Smartphones Hardware Mobile Devices Backup Tech Term Business Email Efficiency Workplace Tips Communications Data Backup Windows 10 Business Management Browser VoIP Business Continuity Android IT Services Smartphone Cloud Computing Small Business Computer Managed IT Services Data Recovery Alert Disaster Recovery Communication Outsourced IT Chrome Computers Managed IT Services Network Miscellaneous Artificial Intelligence Router Windows 10 Office Ransomware Collaboration Cybersecurity Social Media Cybercrime Internet of Things Gadgets Windows IT Support Law Enforcement Mobile Device Office 365 Password Applications Facebook Virtualization Quick Tips Server Productivity Telephone Systems Money Holiday How To Passwords Health Wi-Fi Information Private Cloud Phishing Social Engineering Word Google Drive Work/Life Balance Automation Saving Money Spam Upgrade App Connectivity Keyboard Mobility Paperless Office Data Breach Operating System Scam Data Security BDR Managed Service Apps HaaS Data Protection Voice over Internet Protocol Training Vulnerability Office Tips Settings Bring Your Own Device IT Support Save Money Two-factor Authentication Microsoft Office Hacking Mobile Device Management Encryption IT Management Charger Cryptocurrency Redundancy Avoiding Downtime Legal Servers Spam Blocking Patch Management Automobile Managed Service Provider Wireless VPN Government IT Plan Human Resources Cleaning Google Docs Worker Fraud Access Control Data Management Machine Learning Big Data Users Public Cloud Unsupported Software Comparison Staff Computer Care Virtual Assistant Remote Monitoring Website CES Display Managed IT Marketing Electronic Medical Records Sports Samsung Telephone System Telephony Bandwidth End of Support Content Management Windows 7 Battery History Botnet Entertainment Software as a Service BYOD Business Intelligence USB Value Firewall Networking Data Storage Remote Computing Blockchain Education Augmented Reality Meetings Update Identity Theft Flexibility Infrastructure Save Time Employer-Employee Relationship PDF OneNote Evernote Smart Technology Current Events Advertising Scalability Multi-Factor Security HIPAA Smartwatch Audit Computing Infrastructure Relocation User Error Remote Worker 5G WiFi Criminal Social Excel Credit Cards Inventory Tools Password Manager Search Engine IT solutions Physical Security Workforce SaaS ISP Wireless Charging Devices Two Factor Authentication Knowledge Wireless Internet Warranty Trending Experience Monitor Safe Mode Employee Computer Fan Sync Wiring OLED Data loss Best Practice Risk Management HVAC Vendor Tip of the week Cryptomining Downtime Business Mangement Hiring/Firing Bing Accountants Cortana Thought Leadership Network Congestion Wire Printer webinar Information Technology Music Digital Signage The Internet of Things Techology Transportation Safety Humor Internet Exlporer Unified Threat Management Screen Mirroring Content Politics Rootkit Enterprise Content Management Windows 10s Windows Server 2008 Amazon Authentication MSP Database Root Cause Analysis Gmail Employer Employee Relationship YouTube Help Desk HBO Search Telecommuting Books Assessment Files Virtual Reality Google Apps IT Consultant Hybrid Cloud Mouse Conferencing Software Tips Instant Messaging Specifications Wearable Technology Data storage Google Search FENG Nanotechnology Benefits Mobile Computing Cast Video Games Audiobook Password Management Security Cameras Amazon Web Services File Sharing Business Technology Recovery Recycling Computer Accessories Outlook How to Remote Work Practices Television Worker Commute Workers Addiction Leadership Apple Smart Office Administrator Emails Digital Signature Proactive IT Skype Online Shopping Smart Tech Internet exploMicrosoft Camera Vendor Management NIST Hacker Solid State Drive Flash Biometric Security Travel eWaste Bluetooth Shortcuts Frequently Asked Questions Black Market Hosted Computing Emergency Public Computer Start Menu Cache iPhone Document Management Microchip Millennials Troubleshooting Loyalty Net Neutrality Printers Congratulations CrashOverride Manufacturing Twitter Company Culture Compliance Thank You Managing Stress Webinar Regulation

Recent Comments

NoahAnton Cryptomining is Inspiring Cybercrime
25 April 2019
The growth stock is actually the Cryptomining which increases in capital value instead of yield in h...
Sara George Tip of the Week: Locating a Misplaced Smartphone
16 April 2019
If you’re smart phone will be missed then with the software of the tracking location has to find the...
Jenna Ray What Star Wars can Teach About Mentorship
15 April 2019
There are lots of things in this world from we can learn positivity and people of this era are to ad...
Henry Lasseter What Volkswagen is Doing to Prevent Hackers From Controlling Your Car
09 April 2019
Volkswagen was doing to prevent hackers for from controlling your car it was done by the hackers. I ...
Hunter Gill Essential Cybersecurity Tips From The FBI
09 April 2019
FBI is the federal agency of the investigation the firm which investigates the cases of severe term ...