(707) 268-8850    Get SUPPORT

Network Management Services Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, April 18 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup Hosted Solutions Mobile Devices VoIP Google Email Data Data Recovery Outsourced IT Tech Term IT Support Internet of Things Software IT Services Cloud Computing Saving Money Internet Microsoft BDR Business Continuity Efficiency Communications Hardware Communication Small Business Cybercrime Smartphones Business Ransomware Cybersecurity Android Artificial Intelligence User Tips Server Disaster Recovery Smartphone Windows Managed IT Services Gadgets Browser Avoiding Downtime Save Money How To Network Managed IT Computers Alert Collaboration Business Management Passwords Social Engineering Productivity Router Law Enforcement BYOD Chrome Firewall Applications Phishing Business Intelligence Miscellaneous Windows 10 Data Security Data Protection Social Media Workplace Tips Mobile Device Management Mobility Money Vulnerability Two-factor Authentication Computer Managed Service Provider Private Cloud Word Document Management Identity Theft Compliance Budget Facebook Remote Monitoring Blockchain Office 365 Operating System Virtualization Upgrade Flexibility Redundancy Productivity Bandwidth Spam Telephone Systems Connectivity VPN Proactive IT IT Support File Sharing Information Technology Government CES IT Plan Update Work/Life Balance Unified Threat Management Apps Google Drive Managed Service Encryption Access Control Content Management Unsupported Software Paperless Office Smart Tech Servers Microsoft Office Data Storage Quick Tips Public Cloud Employer-Employee Relationship Training Workers Virtual Assistant Big Data Mobile Computing Settings Credit Cards Spam Blocking Website Data storage Data Breach Office Tips Analysis Mobile Device Content Filtering Infrastructure Data loss App Hacking OneNote Windows 10 Solid State Drive Comparison Holiday Value IT Management Sports Windows 7 Wi-Fi Networking Password Physical Security Bring Your Own Device Information Automation Business Owner User Error Amazon Web Services Audit Inventory Telephony Augmented Reality IT Consultant Smart Office Trending IoT Regulations Enterprise Content Management Wireless Technology Relocation Hosted Solution Supercomputer Business Mangement Cast Addiction Remote Worker Colocation Safety Emergency Unified Communications Downtime Thought Leadership IBM Hiring/Firing Health Frequently Asked Questions YouTube Millennials Hacker Legal Risk Management SaaS Online Shopping Computer Fan Skype Business Technology The Internet of Things Education Leadership Lifestyle Marketing Netflix Password Management Humor Recovery Gmail Cache Wiring Computing Infrastructure Cleaning Patch Management Theft Root Cause Analysis Streaming Media Botnet Files Save Time Strategy Excel Workforce Reputation Internet Exlporer Evernote FENG Authentication Start Menu Apple Software Tips Students Computer Care Insurance Flash NIST Current Events Recycling Wireless Internet Google Docs Camera HaaS Hybrid Cloud Scam Google Apps Meetings Content Filter Travel Tip of the week Telecommuting Customer End of Support HIPAA Wireless Charging Nanotechnology Mobile Telephone System Hard Drives iPhone webinar Human Resources Healthcare History Entertainment Samsung Fraud Windows 10s Practices Cryptocurrency Knowledge eWaste Data Warehousing Wire Voice over Internet Protocol Monitor Remote Work USB Storage Charger Emails Accountants Windows Server 2008 Internet exploMicrosoft Fiber-Optic Professional Services Conferencing Staff HBO Electronic Health Records Amazon Hosted Computing Sync Safe Mode PDF Black Market Electronic Medical Records Network Congestion Criminal Multi-Factor Security HVAC Office Password Manager Screen Mirroring Software as a Service MSP Cortana Data Management Advertising Keyboard Cables CrashOverride Devices Tools Digital Signature Outlook Machine Learning Specifications Loyalty Battery 5G How to Smart Technology Tech Support Techology IT solutions Remote Computing Experience Rootkit Employer Employee Relationship Fun WiFi Content Competition Scalability Music Proactive Customer Relationship Management Company Culture IP Address Best Practice Politics Computer Accessories Shadow IT Two Factor Authentication Users Administration Audiobook Wearable Technology Remote Monitoring and Maintenance Customer Service Vendor Management Managing Stress Mobile Office Assessment Virtual Reality Bluetooth Domains Search Printers Wireless Transportation Line of Business Automobile Books Television Regulation Worker Commute Public Speaking Presentation Instant Messaging Benefits Troubleshooting Twitter Webinar Lithium-ion battery Video Games Public Computer Worker