window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, September 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Cloud Network Security Best Practices Managed IT Services Privacy Business Computing Hackers Data Backup Email Hosted Solutions VoIP Malware Mobile Devices Data Recovery Outsourced IT Microsoft Tech Term Data Google Innovation Backup Cloud Computing Saving Money Software Internet of Things Business Continuity Internet IT Support Ransomware BDR Hardware Efficiency Cybersecurity IT Services Small Business Android Smartphones Disaster Recovery Artificial Intelligence Communications Communication Applications Cybercrime User Tips Network Business How To Router Managed IT Services Gadgets Law Enforcement Managed IT Computers Money Business Intelligence Mobile Device Management Productivity BYOD Two-factor Authentication Data Security IT Support Data Protection Collaboration Avoiding Downtime Business Management Windows Windows 10 Browser Virtualization Phishing Chrome Smartphone Save Money Social Media Spam Alert Connectivity Computer Telephone Systems IT Management Redundancy Passwords Social Engineering Mobility Bandwidth Proactive IT Apps Document Management Productivity Remote Monitoring Blockchain App Facebook Compliance Vulnerability Analysis Office 365 Identity Theft Firewall Workplace Tips Training Word Upgrade Server VPN Infrastructure Servers Credit Cards Update Data Breach Spam Blocking Wi-Fi CES Sports Information Automation File Sharing Data loss Mobile Computing Business Owner Value Operating System Holiday Encryption Machine Learning Education Bring Your Own Device Content Management Managed Service IT Plan Mobile Device Employer-Employee Relationship Microsoft Office Work/Life Balance Paperless Office Windows 7 Networking Budget Access Control Unified Threat Management Virtual Assistant Comparison Smart Tech Workers Unsupported Software Big Data Solid State Drive Flexibility Website Information Technology Password Data Storage Settings Private Cloud OneNote Miscellaneous Software Tips Trending Audit E-Commerce Skype webinar Evernote Virtual Reality Computing Infrastructure Scam Content Filter Staff Healthcare Line of Business Knowledge Black Market Content Filtering Fiber-Optic Nanotechnology Computer Care Wireless Hacking Public Cloud Criminal Wire Excel Millennials Instant Messaging Practices Safe Mode Meetings Botnet Emails Physical Security Lifestyle Windows 10 Cortana HIPAA Accountants HVAC Start Menu Conferencing Wireless Charging Worker Commute Password Manager Storage Legal Entertainment Digital Signature Electronic Health Records MSP Flash Network Congestion Fraud Battery Cables Data Warehousing Samsung Managed Service Provider Tip of the week Workforce Downtime USB Hosted Computing Charger Travel Computer Fan Remote Computing Enterprise Content Management Mobile End of Support Business Mangement Google Docs Augmented Reality Remote Worker Electronic Medical Records IT Consultant Amazon Unified Communications Devices Wireless Technology Data Management PDF Smart Office Windows Server 2008 Telecommuting Recovery Health Office Tips Inventory Screen Mirroring Business Technology HBO FENG Technology Tips Keyboard IoT Password Management Professional Services Gmail Addiction Voice over Internet Protocol Windows 10s The Internet of Things Strategy YouTube Wiring Sync Leadership Amazon Web Services Marketing Hacker HaaS Theft Thought Leadership Google Drive Proactive Remote Work Cast Software as a Service Netflix Cache Outlook NIST Tools Save Time Recycling SaaS Multi-Factor Security Risk Management GDPR Telephony Online Shopping Patch Management Google Apps Streaming Media Hard Drives Human Resources Students Remote Monitoring and Maintenance Regulations Current Events Users Authentication Cleaning Government eWaste Wireless Internet Telephone System Frequently Asked Questions Specifications Insurance Cryptocurrency Root Cause Analysis Politics Managing Stress Computer Accessories Mobile Office Domains Audiobook Two Factor Authentication Techology Regulation CrashOverride Humor Wearable Technology Vendor Management Assessment Video Games Camera Bluetooth Internet Exlporer Transportation Public Speaking User Error Books WiFi Presentation Automobile Hybrid Cloud How to Webinar Television Printers Lithium-ion battery Benefits Twitter Best Practice Hiring/Firing 5G Tech Support Troubleshooting IT solutions Public Computer IBM Scalability Quick Tips Worker Safety Fun Internet exploMicrosoft Smart Technology Loyalty Emergency Shadow IT Files Hosted Solution Customer Relationship Management Office Experience Rootkit Competition Advertising Company Culture Employer Employee Relationship IP Address Colocation Content History Customer Service Relocation Music Search

Mobile? Grab this Article!

QR-Code dieser Seite