094 90 48200     Get SUPPORT

Aniar IT Services Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, November 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Tech Term Google Data Backup User Tips Cloud Business Computing Email Hackers Data Recovery Innovation Network Security Hardware Microsoft Data Malware Internet VoIP Managed IT Services Cloud Computing Browser Business Mobile Devices Android Workplace Tips Communication IT Services Small Business Windows 10 Chrome How To Artificial Intelligence Backup Smartphones Network Communications Internet of Things Applications Software Cybercrime Information Computers Saving Money BDR Cybersecurity Windows Smartphone Collaboration Business Management IT Support Computer Facebook Word Gadgets Ransomware Router Data Security Office 365 Money Miscellaneous Server Hosted Solutions Efficiency Data Protection Outsourced IT Spam Business Continuity Mobile Device Management Vulnerability Two-factor Authentication Productivity Passwords Connectivity Sports Social Engineering CES Apps Avoiding Downtime Fraud Encryption Phishing Remote Monitoring Comparison Microsoft Office IT Plan Infrastructure Content Management Virtual Assistant Settings Keyboard OneNote Virtualization VPN Law Enforcement Managed Service Website Unsupported Software Password Blockchain Save Money Data Storage Paperless Office Scam Managed IT Upgrade Social Media Business Intelligence Update Telephone System Spam Blocking Identity Theft Bring Your Own Device Windows 7 Managed IT services Operating System IT Management Redundancy App BYOD Telephone Systems Downtime Data Management Start Menu Windows 10s Google Drive Workers Frequently Asked Questions Access Control Recovery YouTube Mouse Sync Multi-Factor Security Safe Mode Screen Mirroring Evernote Cleaning Smart Office Networking Employer-Employee Relationship Millennials Remote Worker The Internet of Things Audit Physical Security Recycling Devices WiFi Root Cause Analysis Human Resources Private Cloud Excel Authentication Microchip Cache Cast Practices Document Management Camera Enterprise Content Management Amazon Value Workforce Wiring Big Data eWaste Flash Thought Leadership Google Docs Staff Specifications Public Cloud Tip of the week Bandwidth Search Engine Telephony Wireless Internet Trending Charger Hosted Computing Automation Password Management Data loss Amazon Web Services Accountants Firewall Computer Fan Legal HaaS Servers Bing MSP Software Tips Password Manager Windows Server 2008 Nanotechnology HIPAA USB Wireless Charging HBO Inventory Entertainment Warranty Criminal NIST Cortana Alert Holiday Botnet Telecommuting Unified Threat Management FENG HVAC Help Desk Digital Signature Disaster Recovery File Sharing Business Mangement Smart Tech Computer Care Electronic Medical Records Skype Wire Wi-Fi Google Apps Outlook Mobile Device Government Machine Learning Printer Addiction Voice over Internet Protocol Cryptocurrency Online Shopping Travel Remote Work Mobile Computing Meetings Credit Cards PDF Tools Work/Life Balance Training Augmented Reality Solid State Drive Gmail Patch Management Tech Support Regulation Wireless Technology 5G Safety Quick Tips IBM Fun Marketing Hacker Productivity Budget Company Culture Competition Customer Relationship Management IP Address Users Hard Drives Managing Stress Printers Customer Service Search Mobile Office Domains CrashOverride Wireless Twitter Windows 10 Emergency Public Speaking Managed Service Provider Compliance Presentation Lithium-ion battery Software as a Service Hiring/Firing