094 90 48200     Get SUPPORT

Aniar IT Services Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, April 23 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy User Tips Business Computing Google Productivity Cloud Tech Term Internet Email Data Network Security Data Backup Microsoft Hosted Solutions Data Recovery Workplace Tips Innovation Hardware Mobile Devices Communication Cloud Computing Hackers Communications VoIP Malware Efficiency Android IT Services Smartphone Windows 10 Smartphones Small Business Internet of Things Network Software Artificial Intelligence Business Management Browser IT Support Backup Managed IT Services Business Windows Mobile Device Router Collaboration Gadgets Cybersecurity Chrome How To Cybercrime Applications BDR Outsourced IT Office 365 Business Continuity Saving Money Information Spam Computers Computer Server Word Ransomware Passwords Connectivity Vulnerability Money Operating System Encryption Miscellaneous Facebook Social Media Settings Data Security Mobile Device Management Managed Service Data Protection Paperless Office Holiday Two-factor Authentication Phishing Augmented Reality Telephone System Comparison Spam Blocking Google Docs Apps Machine Learning Bring Your Own Device Access Control Law Enforcement Sports Cryptocurrency Display Telephony CES Microsoft Office IT Management Fraud App Software as a Service Scam Training Managed IT BYOD Update Infrastructure Meetings Business Intelligence Human Resources Keyboard Content Management Website Google Drive VPN Botnet Upgrade Windows 7 Password Disaster Recovery Staff IT Plan Remote Monitoring Virtual Assistant Managed IT services Blockchain Private Cloud OneNote Redundancy Voice over Internet Protocol Automation Telephone Systems Virtualization Unsupported Software Save Money Social Engineering Wi-Fi Data Storage Avoiding Downtime Identity Theft Entertainment Warranty Software Tips Excel Google Apps Employee Electronic Medical Records Wire Online Shopping NIST Vendor Addiction 5G Unified Threat Management Credit Cards PDF HVAC FENG Help Desk Flash Gmail Cortana File Sharing Alert ISP Value Workforce OLED The Internet of Things Printer Tip of the week Workers Hacker Digital Signage Specifications Data Management Evernote Cleaning Trending Mobile Computing HaaS Recycling Devices Cryptomining Biometric Security Big Data YouTube Solid State Drive Mouse Windows Server 2008 Authentication Google Search HBO Practices Users Safe Mode Downtime Security Cameras Cache Smart Office Windows 10s Quick Tips Amazon Networking Shortcuts eWaste Thought Leadership Remote Worker Screen Mirroring Database Telecommuting Audit Microchip Physical Security Computer Care Bandwidth Employer-Employee Relationship Save Time Outlook Government Charger Hosted Computing Root Cause Analysis Smartwatch Skype Wireless Internet Document Management Camera Amazon Web Services Accountants Enterprise Content Management Mobility Legal Wireless Wiring Cast Business Technology Travel Remote Work Search Engine Patch Management Password Manager Nanotechnology Proactive IT Tools Work/Life Balance Public Cloud Frequently Asked Questions Recovery Wireless Charging Inventory Health Start Menu HIPAA USB Password Management Social Sync Multi-Factor Security Criminal Firewall Servers Computer Fan Bing WiFi Business Mangement Smart Tech MSP Data loss Net Neutrality Millennials Education Digital Signature Tech Support CrashOverride Wireless Technology IBM Safety Productivity Marketing Compliance Budget Managed Service Provider Customer Relationship Management Competition IP Address Hiring/Firing Regulation Manufacturing Customer Service Fun Company Culture Mobile Office Emergency Domains Windows 10 Managing Stress Printers Hard Drives Public Speaking Search Twitter Presentation Lithium-ion battery