Male Rep1

 

 "Affordable, Effective, and Fast"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Business Computing Network Security Backup Malware Hosted Solutions Data Google VoIP Mobile Devices Microsoft Business bgc roundup Software nonprofit Disaster Recovery Email Innovation Internet Managed IT Services Business Continuity Alert communications Outsourced IT Hardware IT Services Smartphones User Tips Data Backup Tech Term Browser Windows 10 Managed IT Services Ransomware Server Saving Money Computer Cybercrime Android Cloud Computing Efficiency Data Recovery BDR Workplace Tips Computers Smartphone Business Management Small Business Internet of Things IT Support Network Miscellaneous Passwords Quick Tips Productivity Save Money Productivity IT Support Communication Office Windows Recovery Applications Artificial Intelligence Mobile Device Management Money Managed IT Social Engineering Cybersecurity Telephone Systems BYOD Chrome Phishing Virtualization Hacking Upgrade Law Enforcement Windows 10 Collaboration Facebook Gadgets Vulnerability Firewall Mobility Work/Life Balance Social Media Password VPN Holiday Office 365 Proactive IT Remote Monitoring Two-factor Authentication Private Cloud Bring Your Own Device Router Bandwidth Office Tips Data Protection Avoiding Downtime Flexibility Budget Automation How To Health App Managed Service Provider Compliance Microsoft Office Information Wi-Fi Identity Theft Connectivity Data Breach Business Intelligence Google Drive Information Technology Remote Computing Word History HaaS Black Market Spam Scam Sports Operating System Mobile Computing Value Mobile Device Apps Redundancy Keyboard Data Security Safety Servers Update Business Owner PDF CES Hiring/Firing Government SaaS Emergency Computing Infrastructure Solid State Drive Cleaning Marketing Encryption Managed Service Training Workers Big Data WiFi Document Management Content Management Credit Cards The Internet of Things Computer Care Patch Management Legal Save Time Physical Security Blockchain Virtual Assistant Windows 7 Fraud HIPAA OneNote Risk Management Samsung Unsupported Software Charger Settings Data Storage Website Automobile Telephone System End of Support Electronic Medical Records Data storage Infrastructure Paperless Office IT Management Voice over Internet Protocol Data Management Worker Wireless Technology USB Software as a Service Employer-Employee Relationship YouTube Comparison Entertainment Unified Threat Management Spam Blocking Battery Content Filtering IT Plan Search Engine Data loss Customers Cryptocurrency Tip of the week Scalability Experience Warranty FENG Education Business Mangement HVAC Smart Technology Network Congestion HBO Specifications Relocation Inventory Wiring Windows 10s Tools Theft Wireless Internet Trending Flash Evernote Files Bing Screen Mirroring Techology Safe Mode Employer Employee Relationship webinar Windows Server 2008 Devices Printer Hacker Gmail Networking Two Factor Authentication Outlook Millennials Humor Access Control Public Cloud Cortana Wire IBM Data Warehousing Lifestyle Laptop Accountants MSP Vendor Management Sync Wireless Charging Chromecast Shadow IT Books Help Desk Cast Google Docs Computer Accessories Conferencing Instant Messaging Apple Thought Leadership Mouse Assessment Mobile Users Internet Exlporer Recycling Enterprise Content Management IT Consultant Workforce Authentication Google Apps Smart Office Supercomputer Best Practice Touchpad Content File Sharing Telephony Fiber-Optic Hosted Solution Human Resources Bluetooth Netflix Regulations Amazon NarrowBand Search iPhone Twitter Administrator Television CrashOverride Professional Services Virtual Reality eWaste Password Management Leadership Frequently Asked Questions Telecommuting Politics Nanotechnology Camera Audit User Error Transportation Current Events Software Tips Audiobook Practices Augmented Reality Skype Cables Public Computer Going Green Wireless Staff Regulation Amazon Web Services How to Downtime Addiction Meetings Worker Commute Reputation Advertising Criminal NIST Excel Remote Work Smart Tech Printers Loyalty Computer Fan Microchip Monitor Colocation Password Manager Machine Learning Benefits Knowledge Video Games Hard Drives Hosted Computing Remote Worker Start Menu Unified Communications Multi-Factor Security Digital Signature Rootkit Online Shopping Troubleshooting Robot Cache Thank You Congratulations nonprofits GDPR E-Commerce