094 90 48200     Get SUPPORT

Aniar IT Services Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, September 25 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Tech Term Google Business Computing Email Cloud Hackers Innovation Microsoft Network Security Data Backup Malware Android User Tips Data Recovery Cloud Computing Hardware Mobile Devices Internet VoIP Data Backup Managed IT Services Smartphones Internet of Things Artificial Intelligence How To Communication Small Business Collaboration Browser IT Services Windows 10 Saving Money Cybercrime Computers Applications Chrome Cybersecurity Smartphone Windows Network Software Communications Vulnerability Gadgets Business Management IT Support Data Protection Office 365 Word Ransomware Business Facebook Spam Router Connectivity Mobile Device Management Workplace Tips Data Security Money Two-factor Authentication BDR Passwords Outsourced IT Hosted Solutions Efficiency Managed Service Windows 7 Password Managed IT services Microsoft Office Save Money Blockchain Bring Your Own Device Paperless Office Operating System IT Management Redundancy App Telephone Systems Website Social Engineering BYOD Avoiding Downtime Miscellaneous Upgrade Identity Theft Phishing Comparison Social Media IT Plan Remote Monitoring Settings OneNote Law Enforcement Sports Virtualization CES Unsupported Software Data Storage Managed IT Computer Encryption Business Intelligence Information Update Infrastructure Server Virtual Assistant Content Management Spam Blocking VPN Business Continuity Apps Alert The Internet of Things Disaster Recovery Staff FENG Computer Care Bandwidth Cortana Skype Wireless Internet Outlook Government Charger Hosted Computing Legal Automation Travel Remote Work Firewall Amazon Web Services Accountants Voice over Internet Protocol Password Management Tools Big Data Work/Life Balance MSP Patch Management Servers Password Manager Nanotechnology Start Menu Telephone System HIPAA USB Solid State Drive Frequently Asked Questions Recovery Entertainment Wireless Charging Inventory Meetings NIST Criminal Windows 10s Google Drive Unified Threat Management Holiday Downtime Sync Multi-Factor Security Screen Mirroring Millennials File Sharing Digital Signature HVAC Business Mangement Smart Tech Electronic Medical Records Wire Audit Physical Security Excel Machine Learning Google Apps Mobile Device Employer-Employee Relationship Cryptocurrency Addiction Private Cloud Mobile Computing Online Shopping Productivity Root Cause Analysis Gmail Cast Value Workforce Training Credit Cards PDF Flash Google Docs Specifications Data Management Tip of the week YouTube Workers Access Control Wi-Fi Safe Mode Public Cloud Smart Office Evernote Cleaning Telephony Trending Recycling Devices Remote Worker Fraud HaaS Scam Networking Augmented Reality Human Resources Computer Fan Windows Server 2008 Authentication Data loss Cache Software Tips HBO Document Management Camera Keyboard Practices eWaste Thought Leadership Botnet Telecommuting Wiring Amazon Enterprise Content Management Emergency Productivity Marketing Hacker Managing Stress Budget Printers Customer Relationship Management Managed Service Provider Competition IP Address Users Hiring/Firing Twitter Customer Service Fun WiFi Mobile Office Domains Compliance Wireless Windows 10 Public Speaking Regulation Quick Tips Hard Drives Presentation Search Lithium-ion battery Company Culture Wireless Technology 5G Tech Support IBM CrashOverride Safety