shutterstock 4600 TEST SIZE V1 051716


 "IT Management that You can count on."

Have IT Questions?
Call us now (888) 894-6411


Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, September 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Business Computing Hackers Network Security Backup Malware Hosted Solutions Mobile Devices Microsoft Google VoIP nonprofit Email Data bgc Software Disaster Recovery roundup Managed IT Services Alert Outsourced IT Innovation Internet Business Business Continuity Smartphones Hardware IT Services communications Tech Term Windows 10 Ransomware Saving Money Data Backup Cybercrime Browser Android Server Managed IT Services Computer Efficiency Computers Internet of Things IT Support Small Business Cloud Computing Network Windows Smartphone BDR Quick Tips Passwords Save Money User Tips Business Management Productivity Office Data Recovery BYOD Artificial Intelligence Recovery Money Cybersecurity Social Engineering IT Support Mobile Device Management Applications Managed IT Communication Miscellaneous Telephone Systems Upgrade Law Enforcement Hacking Firewall Vulnerability Mobility Productivity Facebook Work/Life Balance Gadgets Virtualization Workplace Tips Collaboration Phishing Social Media App VPN Router Proactive IT Wi-Fi Office Tips Password Avoiding Downtime How To Holiday Private Cloud Bandwidth Office 365 Compliance Bring Your Own Device Remote Monitoring Health Chrome Data Protection Microsoft Office Automation Windows 10 Flexibility Two-factor Authentication Managed Service Provider Budget Google Drive Safety Data Security Mobile Device Information Technology Apps Identity Theft History Black Market Value Connectivity Business Intelligence Operating System Remote Computing Word Redundancy Sports HaaS Mobile Computing Data Breach Patch Management Marketing Infrastructure Paperless Office Comparison OneNote Samsung Data Management Servers USB IT Plan Scam Keyboard Update Charger Settings Information Entertainment Physical Security Battery Content Filtering CES The Internet of Things Electronic Medical Records Business Owner Credit Cards Encryption Managed Service Worker Emergency Content Management End of Support Employer-Employee Relationship Big Data Document Management Windows 7 Data storage Unified Threat Management Spam Blocking Spam Blockchain Virtual Assistant SaaS Legal Hiring/Firing Unsupported Software Save Time HIPAA Data Storage Website Cleaning Risk Management Training Workers Government Wireless Technology PDF Computer Care YouTube Automobile Computing Infrastructure IT Management Solid State Drive Excel Remote Work Files Practices Augmented Reality IBM Politics Meetings Software as a Service Vendor Management Virtual Reality Staff Regulation Assessment Audiobook Start Menu Unified Communications Addiction Computer Accessories Conferencing NIST Online Shopping Hacker Smart Tech IT Consultant How to Multi-Factor Security Humor Criminal Worker Commute Tip of the week Hosted Computing Remote Worker Supercomputer Data loss Password Manager Machine Learning HBO Specifications Apple Digital Signature Television CrashOverride Video Games Tools Theft Cache Bluetooth Netflix Cryptocurrency Audit Flash Evernote Internet Exlporer Leadership Troubleshooting Trending Windows Server 2008 Inventory Wiring Transportation Current Events Scalability Experience Screen Mirroring WiFi Business Mangement HVAC Outlook Millennials iPhone Public Computer Chromecast Wireless Internet Laptop Education Safe Mode Loyalty Computer Fan Sync Wireless Charging Devices Data Warehousing Lifestyle Techology Fraud User Error Access Control Benefits Knowledge Cast Google Docs Gmail Networking Downtime Workforce Accountants MSP Mobile Wireless Cortana Wire Rootkit Touchpad FENG NarrowBand Telephony Reputation Fiber-Optic Advertising Thought Leadership Shadow IT Books Windows 10s Regulations Monitor Amazon Colocation Authentication Smart Technology Network Congestion Instant Messaging Hard Drives Recycling Enterprise Content Management Frequently Asked Questions Robot Telecommuting File Sharing Professional Services Google Apps Smart Office Users Human Resources Telephone System Best Practice Content Skype Customers Cables Twitter Employer Employee Relationship webinar Going Green Hosted Solution Software Tips Public Cloud Amazon Web Services Nanotechnology Camera Two Factor Authentication Search Voice over Internet Protocol Relocation eWaste Password Management Thank You Printers Congratulations GDPR nonprofits E-Commerce