window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, January 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Cloud Network Security Best Practices Business Computing Privacy Managed IT Services Data Backup Hackers Hosted Solutions Malware Data Recovery VoIP Mobile Devices Email Data Outsourced IT Google Innovation User Tips Tech Term Backup Internet Microsoft Internet of Things Business Continuity Hardware Cloud Computing BDR Saving Money Business Communications IT Services Software Ransomware Cybersecurity Efficiency Communication Smartphone Productivity IT Support Smartphones Router Managed IT Services Disaster Recovery Artificial Intelligence Small Business Cybercrime Android Network IT Support Applications Windows 10 Chrome Workplace Tips Browser Business Management Computer Phishing Law Enforcement Managed IT Gadgets How To Virtualization Data Protection Office 365 Server Money Spam Information Word Mobile Device Management Holiday Mobility BYOD Business Intelligence Two-factor Authentication Blockchain Access Control Mobile Device Collaboration Windows Avoiding Downtime Data Security Save Money Computers Connectivity Voice over Internet Protocol Software as a Service Miscellaneous Upgrade Automation Social Media Encryption Machine Learning Identity Theft Telephone Systems Alert Bandwidth Proactive IT Document Management Managed Service Servers Wi-Fi Passwords Social Engineering Analysis Vulnerability Compliance Apps Settings Firewall Training Productivity Remote Monitoring IT Management App Redundancy Facebook Big Data Solid State Drive Data Breach Flexibility Information Technology IT Plan Password Website Spam Blocking CES Sports Windows 7 Private Cloud File Sharing Comparison Unsupported Software Telephony Value Operating System Data Storage Business Owner Content Management Education Bring Your Own Device Update Paperless Office Credit Cards Keyboard Botnet Networking Smart Tech Unified Threat Management Work/Life Balance Workers Human Resources Fraud Data loss Virtual Assistant Employer-Employee Relationship Infrastructure OneNote Hacker Mobile Computing VPN Google Drive Budget Google Docs Microsoft Office Scam Telephone System Professional Services Black Market Content Filtering Password Manager Storage Social HBO Accountants HVAC Emails E-Commerce Hard Drives Cables Search Engine Users Hacking Digital Signature Electronic Health Records Conferencing Line of Business Sync Amazon Web Services Instant Messaging Samsung Printer Cast Worker Commute Network Congestion Remote Work HIPAA Hosted Computing Tools Battery Business Mangement Downtime Vendor Outlook Legal Entertainment Computing Infrastructure Enterprise Content Management Charger Camera USB Unified Communications Devices Computer Fan Bing Multi-Factor Security MSP Online Shopping Mouse Government Smart Office Electronic Medical Records IT Consultant Regulations Wireless Remote Computing Public Cloud Inventory Root Cause Analysis Windows 10 Cortana Gmail Addiction Display Frequently Asked Questions Specifications IoT Password Management Recovery Theft Thought Leadership FENG Help Desk Software Tips Trending Data Management Strategy YouTube Remote Worker Skype Evernote Windows 10s Administrator Leadership Managed Service Provider Meetings Recycling Cache Business Technology Security Cameras Excel Millennials End of Support NIST Netflix Virtual Private Network Google Apps Streaming Media Shortcuts Physical Security Lifestyle Wiring Start Menu Augmented Reality Wireless Charging Authentication SaaS Microchip Data Warehousing WiFi Save Time Health Office Tips Students Proactive Wireless Technology Flash PDF Project Management Travel Patch Management Technology Tips eWaste Wireless Internet Current Events Tip of the week Workforce Risk Management Insurance Cryptocurrency Cleaning Content Filter eCommerce Marketing HaaS GDPR The Internet of Things Mobile Fiber-Optic Nanotechnology Audit Staff Healthcare webinar Remote Monitoring and Maintenance Amazon Warranty Screen Mirroring Virtual Reality Criminal Wire Knowledge Smartwatch Windows Server 2008 Telecommuting Practices Safe Mode Computer Care CrashOverride IP Address Audiobook Colocation Vendor Management Assessment History Bluetooth Wearable Technology Customer Service Transportation Relocation Regulation Video Games Search Books Twitter Mobile Office Webinar How to Television Automobile Techology Domains Benefits Humor Best Practice Internet Exlporer IT solutions Printers Troubleshooting Public Computer User Error Worker Public Speaking Loyalty Smart Technology Presentation Scalability Hybrid Cloud Emergency Lithium-ion battery Shadow IT Hosted Solution Hiring/Firing Company Culture Rootkit Tech Support Employer Employee Relationship 5G Experience IBM Quick Tips Employee/Employer Relationship Safety Fun Internet exploMicrosoft Content Managing Stress Utility Computing Files Computer Accessories Music Customer Relationship Management Office Two Factor Authentication Competition Politics Advertising

Mobile? Grab this Article!

QR-Code dieser Seite