window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, April 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Privacy Data Backup Hosted Solutions Managed IT Services Malware Hackers Data Recovery Email Internet VoIP Mobile Devices Data Productivity User Tips Google Communications Internet of Things Outsourced IT Innovation Microsoft Tech Term Efficiency Cybersecurity Backup IT Services Hardware Software Cloud Computing Business Continuity Saving Money Artificial Intelligence Business Smartphones Business Management Communication Small Business BDR Workplace Tips Android Ransomware Disaster Recovery IT Support Managed IT Services Windows 10 Phishing Smartphone Cybercrime IT Support Network Router Applications Collaboration Chrome Gadgets Browser Computer Mobile Device Windows Training Server Law Enforcement How To Managed IT Encryption Proactive IT Social Media Blockchain Access Control Spam Mobile Device Management Data Security Avoiding Downtime Holiday Mobility Two-factor Authentication Data Protection Passwords Virtualization Money Word Save Money Computers Information Business Intelligence Office 365 BYOD Miscellaneous Upgrade Managed Service Operating System Bandwidth Social Engineering Business Technology Paperless Office Telephone Systems Education IT Management Analysis Redundancy Wi-Fi App Remote Monitoring Document Management Facebook Vulnerability Voice over Internet Protocol Settings Software as a Service Apps Compliance Private Cloud Productivity Identity Theft Connectivity Firewall File Sharing Alert Automation Machine Learning Servers Meetings Botnet Content Management Value Virtual Private Network Fraud Data loss Wireless Health Business Owner Mobile Computing Smart Tech Remote Computing Employer-Employee Relationship Bring Your Own Device Manufacturing Networking Google Docs Virtual Assistant Unified Threat Management Human Resources Workers Google Drive Cryptocurrency Keyboard Infrastructure Solid State Drive IT Plan VPN Augmented Reality Flexibility Telephone System OneNote Staff Healthcare Work/Life Balance Password Windows 7 Information Technology Save Time Comparison Telephony Hacker Unsupported Software Data Breach Data Storage Microsoft Office Budget CES Sports Scam Big Data Spam Blocking Update Website Display Credit Cards Users Restore Data Computer Fan Smart Office Hacking Help Desk Excel Millennials Inventory Managed Service Provider Instant Messaging Remote Worker Start Menu Wireless Charging Gmail Addiction Worker Commute Administrator Electronic Medical Records IT Consultant Physical Security Lifestyle IoT Password Management End of Support HIPAA Google Search Battery Logistics Data Warehousing WiFi Strategy YouTube Legal Entertainment Security Cameras Flash Theft Thought Leadership Wiring Backup and Disaster Recovery FENG Travel Office Tips Shortcuts Tip of the week Workforce PDF USB Mobile Recycling Cache Technology Tips Quick Tips Microchip Leadership Windows 10 NIST Proactive Net Neutrality Windows 10s Streaming Media Project Management HaaS Employee/Employer Relationship Netflix Amazon Google Apps GDPR Cryptomining Screen Mirroring Students Data Management eCommerce Windows Server 2008 Telecommuting Authentication Recovery Professional Services eWaste Wireless Internet HBO Insurance Remote Monitoring and Maintenance ISP SaaS Amazon Web Services Content Filter Warranty Biometric Security Current Events Smartwatch Cleaning Sync E-Commerce Database Cast Wireless Technology 5G Social Remote Work Fiber-Optic Nanotechnology Hard Drives Tools Criminal Wire Search Engine webinar Outlook Practices Safe Mode Line of Business File Versioning Audit Online Shopping Password Manager Marketing Storage Patch Management Printer OLED Knowledge Multi-Factor Security Accountants The Internet of Things HVAC Computing Infrastructure Risk Management Employee Computer Care Camera Government Digital Signature Electronic Health Records Vendor Vendor Management Emails Regulations Cables Root Cause Analysis Bing Conferencing Frequently Asked Questions Specifications Hosted Computing Public Cloud MSP Multiple Versions Skype Evernote Business Mangement Cortana Virtual Reality Mouse Network Congestion Software Tips Trending Enterprise Content Management Digital Signage Samsung Content Filtering Distribution Downtime Charger Unified Communications Devices Black Market Television Customer Service Hybrid Cloud Wearable Technology Mobile Office Transportation Video Games Hiring/Firing Books Domains IT solutions Public Computer Automobile Worker How to Benefits Fun Internet exploMicrosoft Loyalty Public Speaking Company Culture Best Practice Presentation Files Rootkit Troubleshooting Lithium-ion battery Office Smart Technology Utility Computing Employer Employee Relationship Scalability Advertising Emergency Managing Stress Colocation History Tech Support Shadow IT Hosted Solution Safety Relocation Computer Accessories IBM Search Experience Two Factor Authentication Regulation Analytics CrashOverride Content Techology Competition Humor Bluetooth Customer Relationship Management Music Assessment Twitter IP Address Internet Exlporer Politics Printers User Error Audiobook Webinar

Mobile? Grab this Article!

QR-Code dieser Seite