(707) 268-8850    Get SUPPORT

Network Management Services Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 19 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup VoIP Hosted Solutions Google Mobile Devices Email Outsourced IT Data Recovery IT Support Data Tech Term Cloud Computing Saving Money Microsoft Software Internet of Things Business Continuity Efficiency Hardware Internet Communications BDR IT Services Cybercrime Business Cybersecurity Ransomware Small Business User Tips Smartphones Communication Disaster Recovery Android Artificial Intelligence Avoiding Downtime Save Money How To Managed IT Network Server Computers Alert Managed IT Services Smartphone Windows Gadgets Browser Phishing Firewall Miscellaneous Applications Social Media Mobile Device Management Two-factor Authentication Business Intelligence Mobility Passwords Money Business Management Data Security Data Protection Windows 10 Collaboration Productivity Vulnerability Router BYOD Social Engineering Chrome Law Enforcement Office 365 Identity Theft Facebook Blockchain Upgrade Remote Monitoring Word Virtualization Operating System Spam Productivity Flexibility Bandwidth Workplace Tips Telephone Systems Proactive IT Computer Connectivity IT Support VPN Redundancy Managed Service Provider Document Management Budget Private Cloud Compliance Quick Tips Website Smart Tech Virtual Assistant Employer-Employee Relationship IT Plan Settings Public Cloud Update Data Breach Data storage Credit Cards Content Filtering Office Tips Unsupported Software Mobile Device Analysis Data Storage Servers Windows 10 App Mobile Computing Wi-Fi Value Solid State Drive Infrastructure Holiday Hacking Spam Blocking Networking Sports Bring Your Own Device Information Password File Sharing Business Owner Apps Unified Threat Management Physical Security Information Technology Automation Work/Life Balance CES Government Managed Service Data loss Comparison Microsoft Office OneNote IT Management Encryption Google Drive Content Management Paperless Office Training Workers Windows 7 Big Data Access Control Gmail Cache Computing Infrastructure Outlook Specifications Humor CrashOverride Tools Save Time Files Trending Strategy Computer Care NIST Audit Telephony Theft Streaming Media Current Events HaaS Students Reputation Internet Exlporer Regulations Evernote Authentication Scam Apple Cast Recycling Wireless Internet webinar Frequently Asked Questions Millennials Insurance Telephone System Downtime Lifestyle HIPAA Samsung Hybrid Cloud Cryptocurrency Computer Fan Skype Google Apps Content Filter Knowledge Entertainment Human Resources Healthcare Charger Emails Customer End of Support Wireless Charging Nanotechnology Hard Drives iPhone eWaste Wire Conferencing Monitor History Excel Workforce USB Fraud Practices Root Cause Analysis Botnet Network Congestion Software Tips Accountants Safe Mode FENG Start Menu Storage Electronic Medical Records Google Docs Staff Electronic Health Records Internet exploMicrosoft HVAC Flash PDF Black Market Fiber-Optic MSP Criminal Tip of the week Telecommuting Augmented Reality Amazon Hosted Computing Meetings Travel Data Management IT Consultant Cortana Keyboard Wireless Technology Office Mobile Password Manager Remote Worker Data Warehousing Voice over Internet Protocol Safety Digital Signature Machine Learning Advertising Enterprise Content Management Windows 10s IBM Cables Devices Supercomputer Marketing Hacker Smart Office User Error Windows Server 2008 Remote Work Hosted Solution The Internet of Things Amazon Web Services Inventory Emergency Addiction Leadership Colocation HBO IoT SaaS Relocation Business Technology Professional Services Business Mangement Wiring Multi-Factor Security Legal Risk Management YouTube Cleaning Netflix Password Management Sync Education Unified Communications Thought Leadership Hiring/Firing Health Recovery Online Shopping Patch Management Screen Mirroring Software as a Service Computer Accessories Scalability Music Fun Users Camera Best Practice Politics Company Culture Customer Service Two Factor Authentication Audiobook Mobile Office Vendor Management Shadow IT Remote Monitoring and Maintenance Bluetooth Administration Wearable Technology Domains Assessment Printers Wireless Managing Stress Virtual Reality WiFi Transportation Line of Business Public Speaking Books Television Search Regulation Automobile Presentation Worker Commute Lithium-ion battery Webinar Benefits Worker Instant Messaging Troubleshooting Public Computer Video Games 5G Loyalty Tech Support Twitter IT solutions Battery Smart Technology Rootkit How to Techology Employer Employee Relationship Remote Computing Experience Competition Customer Relationship Management Content IP Address Proactive