(707) 268-8850    Get SUPPORT

Network Management Services Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup Hosted Solutions Mobile Devices VoIP Google Email Data Recovery Tech Term Outsourced IT Data IT Support Saving Money Internet of Things Internet Cloud Computing Microsoft Software IT Services Business Continuity Efficiency Communications Hardware BDR Cybersecurity Smartphones Business Ransomware Cybercrime Communication Small Business Artificial Intelligence User Tips Server Disaster Recovery Android How To Gadgets Browser Avoiding Downtime Network Save Money Managed IT Services Computers Managed IT Smartphone Windows Alert Productivity Router Business Intelligence BYOD Windows 10 Applications Data Security Data Protection Miscellaneous Business Management Social Media Vulnerability Money Mobile Device Management Workplace Tips Chrome Two-factor Authentication Firewall Computer Phishing Mobility Passwords Social Engineering Collaboration Law Enforcement Productivity Bandwidth Document Management Blockchain Budget Remote Monitoring Virtualization Office 365 Facebook Operating System Proactive IT IT Support Redundancy Upgrade Connectivity Spam Flexibility VPN Compliance Telephone Systems Managed Service Provider Word Private Cloud Identity Theft Quick Tips Data Storage Work/Life Balance Servers Employer-Employee Relationship Microsoft Office Public Cloud Mobile Computing Credit Cards Spam Blocking Value Big Data Data storage Analysis Website Networking Bring Your Own Device Infrastructure Data loss Office Tips Unified Threat Management OneNote Sports Hacking Comparison Mobile Device Information Windows 10 IT Management File Sharing App Windows 7 Automation Solid State Drive CES Physical Security Training Workers Managed Service Wi-Fi IT Plan Holiday Government Update Password Encryption Settings Access Control Data Breach Business Owner Content Management Paperless Office Google Drive Content Filtering Information Technology Unsupported Software Apps Smart Tech Virtual Assistant Samsung Hosted Solution Theft The Internet of Things Streaming Media Camera Computing Infrastructure Knowledge Marketing Strategy NIST Hacker Humor Evernote Authentication Files Root Cause Analysis Botnet Students Excel Charger Workforce Emails FENG Start Menu Education Recycling Wireless Internet Reputation Internet Exlporer Software Tips Conferencing Legal Risk Management Insurance Telephone System Apple Flash Recovery Google Apps Content Filter Electronic Medical Records Google Docs Network Congestion Cryptocurrency Wireless Charging Nanotechnology Meetings Travel Save Time Human Resources Healthcare Hybrid Cloud Tip of the week Telecommuting Mobile eWaste Wire Customer End of Support Fraud Practices Hard Drives iPhone Windows 10s Storage Monitor History Data Warehousing Voice over Internet Protocol IT Consultant HaaS Accountants Safe Mode Fiber-Optic MSP Supercomputer Staff HVAC Electronic Health Records Windows Server 2008 Remote Work Emergency Professional Services Criminal Internet exploMicrosoft HBO HIPAA Amazon Hosted Computing Sync SaaS Password Manager Multi-Factor Security Leadership Entertainment USB Cables Devices Cortana Remote Worker Screen Mirroring Software as a Service Digital Signature Enterprise Content Management Machine Learning Office Cleaning Netflix CrashOverride Patch Management Tools Smart Office Advertising Outlook Specifications Amazon Web Services Inventory Audit Telephony PDF Black Market Business Mangement Addiction User Error Trending IoT Business Technology Unified Communications Thought Leadership Wiring Augmented Reality Colocation Cast Current Events Data Management Password Management YouTube Relocation Regulations Computer Care Wireless Technology Hiring/Firing Health Downtime Scam Frequently Asked Questions Millennials Keyboard Online Shopping Computer Fan Skype Gmail IBM Cache Lifestyle webinar Safety How to WiFi Techology Fun Company Culture Remote Monitoring and Maintenance Transportation Remote Computing Experience Books Television Customer Relationship Management Competition Printers Administration Content IP Address Managing Stress Line of Business Benefits Users Webinar Scalability Music Public Computer Customer Service Worker Best Practice Politics Regulation Loyalty Shadow IT Audiobook Search Mobile Office Wearable Technology Domains Smart Technology IT solutions Virtual Reality Rootkit Wireless Twitter Employer Employee Relationship Public Speaking Automobile Worker Commute Presentation Computer Accessories Lithium-ion battery Instant Messaging Troubleshooting Two Factor Authentication Proactive 5G Tech Support Vendor Management Video Games Assessment Battery Bluetooth