Infracore LLC Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, January 18 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business computing Google Network Security Data Hosted Solutions Malware Hackers Microsoft User Tips Innovation Software Internet Tech Term Hardware Business Backup Smartphones Mobile Devices Data Backup Browser Business Continuity Smartphone Email Windows 10 Computer Productivity Android IT Services VoIP Disaster Recovery Managed IT Services Small Business Alert Business Management Workplace Tips Communications Data Recovery Cloud Computing Outsourced IT Computers Chrome Miscellaneous Office Communication Artificial Intelligence Efficiency Router Managed IT Services Ransomware Windows 10 Law Enforcement Cybercrime Network Telephone Systems Holiday Internet of Things Office 365 How To Password Applications Facebook Virtualization Collaboration Cybersecurity Windows Productivity Money IT Support Passwords Social Media Wi-Fi Google Drive Automation Quick Tips Saving Money Information Upgrade Mobile Device Work/Life Balance Word Health Server App Social Engineering Spam Gadgets Mobility BDR Keyboard Mobile Device Management Data Protection Data Breach Apps Phishing Voice over Internet Protocol Scam Managed Service HaaS Data Security Office Tips Two-factor Authentication IT Support Connectivity Vulnerability Private Cloud Microsoft Office Bring Your Own Device Save Money Hacking Settings Firewall Networking BYOD Human Resources Fraud Access Control Public Cloud Data Storage Google Docs Legal Employer-Employee Relationship Automobile OneNote Charger Comparison Redundancy Servers IT Management Website CES Patch Management Paperless Office End of Support Avoiding Downtime Data Management Spam Blocking History Cleaning Worker IT Plan Content Management Operating System Machine Learning Marketing Big Data Virtual Assistant Computer Care Business Intelligence Battery PDF Unsupported Software Blockchain Identity Theft Update Remote Monitoring Sports Electronic Medical Records Managed IT Infrastructure Telephone System Samsung Encryption Remote Computing Bandwidth Telephony Training Managed Service Provider Windows 7 Software as a Service Entertainment Government Botnet Flexibility USB Value VPN Camera Scalability Skype Wireless Charging Devices NIST Hacker Computing Infrastructure Vendor Management Emails Trending Solid State Drive Flash Shortcuts Bluetooth Augmented Reality Emergency Public Computer Accountants Document Management Microchip Wireless Save Time Humor Internet Exlporer Meetings Travel Business Mangement Troubleshooting Loyalty Frequently Asked Questions Smart Technology Current Events Files Start Menu Cortana Thought Leadership Cryptocurrency Staff Data storage Audit Amazon Authentication Social Hybrid Cloud Remote Worker Best Practice Excel Telecommuting Search Engine Gmail SaaS Wireless Internet Warranty Information Technology Two Factor Authentication Knowledge Tools Google Apps Safe Mode Techology Users Experience IT solutions Physical Security Specifications Computer Fan Sync Amazon Web Services Nanotechnology HVAC Vendor Risk Management Apple Wiring Content Tip of the week Remote Work Practices Bing Search Hiring/Firing Internet exploMicrosoft Data loss Recovery Recycling Wire Printer Instant Messaging Network Congestion Downtime Workers Addiction Virtual Reality Music Digital Signature Transportation Safety The Internet of Things Online Shopping Smart Tech Enterprise Content Management Display Politics Rootkit iPhone webinar Unified Threat Management Video Games Audiobook Windows 10s Windows Server 2008 Hosted Computing YouTube Help Desk How to Employer Employee Relationship Advertising Screen Mirroring eWaste MSP Books Assessment Mouse IT Consultant Relocation User Error Root Cause Analysis Cache Worker Commute Wearable Technology HBO Millennials Benefits FENG Evernote Password Management Security Cameras Education Conferencing Software Tips Multi-Factor Security HIPAA Mobile Computing Credit Cards Inventory Black Market Computer Accessories Cast WiFi Criminal File Sharing Television Monitor Smart Office Administrator Leadership Password Manager Outlook Workforce Managing Stress Regulation Printers Smartwatch Webinar CrashOverride Twitter Thank You Congratulations Company Culture Compliance

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

AngusCousens Preventing Identity Theft Should be a Priority, But Do You Know How to Handle It?
27 December 2018
What a good story you have written and I feel good reading about your story and we should share thin...
George Nivison Bring Your Own Device Is Great...When Applied Properly
21 December 2018
If you think you device get slow then try once again for the device sharing speed with the connectin...
Chantale Bass Tip of the Week: How to Use Tabs to Their Full Potential
15 December 2018
Tabs we need to use only with the ways of the potentially uses from the internet use and also for th...
JoseSClark How You Can Get Microsoft Office Certified
14 December 2018
Many users want to get Microsoft Office certified for theirselve and it was a good post for them. Re...
Donna Brock 3 Significant Ways the Cloud Can Grow Your Business
13 December 2018
In every field of life technology have a big name and now technology provide the facility to save yo...