Female Rep1

 

 "99% Positive Customer Satisfaction Rate"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Hackers Network Security Hosted Solutions Backup Malware Mobile Devices Google VoIP Data Microsoft Disaster Recovery Business nonprofit Internet communications Software bgc Email Business Continuity roundup Innovation Outsourced IT Managed IT Services IT Services Alert User Tips Smartphones Hardware Data Backup Productivity Tech Term Browser Windows 10 Managed IT Services Smartphone Server Efficiency Data Recovery Saving Money Computer Ransomware Cloud Computing Internet of Things IT Support Android Workplace Tips Cybercrime Business Management Small Business Communication IT Support Network BDR Computers Save Money Artificial Intelligence Quick Tips Productivity Cybersecurity Windows Office Passwords Miscellaneous Managed IT Gadgets Mobile Device Management Router Mobile Device Mobility Money Social Engineering Telephone Systems Holiday BYOD Chrome Applications Recovery Windows 10 Private Cloud Hacking Upgrade Law Enforcement Facebook Vulnerability Firewall Automation Work/Life Balance Wi-Fi Health Office 365 Virtualization Collaboration Social Media Phishing Proactive IT Two-factor Authentication Bring Your Own Device Flexibility Bandwidth Budget Data Protection Office Tips App Avoiding Downtime How To Password Managed Service Provider Compliance Remote Monitoring VPN Information Microsoft Office Google Drive Word Information Technology Spam History Sports Black Market Apps Settings Scam Operating System Keyboard Mobile Computing Value Voice over Internet Protocol Software as a Service Data Security Safety Redundancy Servers Identity Theft Connectivity Business Intelligence HaaS Save Time Data Breach Remote Computing Encryption Managed Service Content Management Computer Care Hacker Automobile Windows 7 Fraud Access Control Patch Management Google Docs OneNote Unsupported Software Blockchain Virtual Assistant Physical Security Samsung Telephony Charger Data Management USB Data Storage Website Content Filtering Human Resources Telephone System Entertainment Electronic Medical Records Battery End of Support Wireless Technology IT Management Business Owner YouTube Infrastructure Paperless Office Data storage Worker Emergency Comparison Employer-Employee Relationship Unified Threat Management Spam Blocking Big Data IT Plan Document Management Update Machine Learning SaaS Hiring/Firing CES Cleaning PDF Legal Government Training Computing Infrastructure Workers Credit Cards The Internet of Things Solid State Drive HIPAA WiFi Marketing Risk Management Data Warehousing Lifestyle Laptop Safe Mode Public Cloud Best Practice Content Sync Wireless Charging Display Chromecast Devices Printer Two Factor Authentication Hosted Solution Networking Vendor Management Bing Humor IBM Search Cast Gmail Virtual Reality Workforce Accountants MSP Assessment Politics Mobile Google Search Cortana Wire Computer Accessories Conferencing Touchpad Audiobook Fiber-Optic Security Cameras Thought Leadership Mouse Apple IT Consultant Recycling Enterprise Content Management Internet Exlporer Regulations Amazon Help Desk NarrowBand Authentication Supercomputer How to Worker Commute Frequently Asked Questions Telecommuting File Sharing Television CrashOverride Professional Services Net Neutrality Google Apps Smart Office Bluetooth Netflix Software Tips Audit Video Games Skype Cables Botnet Twitter Administrator iPhone Leadership eWaste Going Green Password Management Amazon Web Services Shortcuts Nanotechnology Camera Transportation Current Events Troubleshooting Excel Remote Work Practices Augmented Reality Public Computer Scalability Experience Meetings ISP User Error Education Staff Regulation Loyalty Wireless Computer Fan Start Menu Unified Communications Smartwatch Addiction Downtime Criminal NIST Reputation Advertising Online Shopping Social Smart Tech Printers Benefits Knowledge Multi-Factor Security Colocation Techology Tip of the week Microchip Hosted Computing Remote Worker Hard Drives Data loss Password Manager Monitor Rootkit HBO Specifications Digital Signature FENG Tools Theft Employee Cache Robot Trending Cryptocurrency Customers Windows 10s Flash Evernote Vendor Warranty Smart Technology Network Congestion Shadow IT Books Windows Server 2008 Search Engine Inventory Wiring Relocation Instant Messaging Screen Mirroring Business Mangement HVAC Users Outlook Millennials Digital Signage Wireless Internet Employer Employee Relationship Files webinar GDPR E-Commerce Thank You nonprofits Congratulations