window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Managed IT Services Privacy Data Backup Hackers Malware Email Data Recovery VoIP Data Hosted Solutions Mobile Devices Innovation Outsourced IT Tech Term Google Hardware Internet Microsoft Backup BDR Software Internet of Things User Tips Business Continuity Saving Money Business Cloud Computing Communications Ransomware IT Services Cybersecurity Android Efficiency Communication Small Business Managed IT Services IT Support Cybercrime Smartphones Disaster Recovery Workplace Tips Artificial Intelligence Productivity Browser Applications Network Chrome Router How To Managed IT Computer IT Support Business Management Gadgets Smartphone Windows 10 Law Enforcement Spam BYOD Save Money Information Mobile Device Management Computers Two-factor Authentication Data Security Avoiding Downtime Blockchain Data Protection Virtualization Server Phishing Collaboration Windows Money Business Intelligence Firewall Encryption Social Engineering IT Management Passwords Redundancy Remote Monitoring Bandwidth Proactive IT App Apps Facebook Telephone Systems Analysis Productivity Mobility Document Management Identity Theft Vulnerability Office 365 Word Miscellaneous Upgrade Compliance Training Connectivity Alert Social Media Servers File Sharing CES Sports Data Breach Scam Machine Learning Fraud Data loss Content Management Spam Blocking Wi-Fi Automation Managed Service Mobile Computing Access Control Employer-Employee Relationship Paperless Office Value Operating System Smart Tech Business Owner Virtual Assistant IT Plan Voice over Internet Protocol Education Bring Your Own Device Solid State Drive Budget Holiday Windows 7 Flexibility Microsoft Office Information Technology Networking Comparison Unified Threat Management Password Telephone System Infrastructure Unsupported Software Workers Keyboard VPN Private Cloud Big Data Data Storage Mobile Device Website Work/Life Balance Settings OneNote Update Credit Cards Bing Hosted Computing Meetings Botnet Knowledge MSP Excel Millennials Computer Care Wireless Windows 10 Business Mangement Physical Security Lifestyle Emails Mouse Enterprise Content Management Start Menu Managed Service Provider Wireless Charging Virtual Reality Unified Communications Devices Data Warehousing WiFi Conferencing Flash End of Support Black Market Content Filtering Help Desk Inventory Travel Network Congestion Remote Worker Smart Office Tip of the week Workforce Samsung PDF Downtime Hacking Gmail Addiction Health Charger Office Tips Instant Messaging Administrator IoT Password Management Mobile Worker Commute Business Technology Theft Thought Leadership Google Docs Technology Tips HIPAA Virtual Private Network Strategy YouTube Amazon Computer Fan Augmented Reality Battery Screen Mirroring Electronic Medical Records IT Consultant Legal Entertainment Wiring Windows Server 2008 Telecommuting HaaS Wireless Technology NIST Professional Services Google Drive Proactive Recycling Cache HBO USB Microchip Google Apps Streaming Media Marketing Hacker Remote Computing Project Management Sync Amazon Web Services FENG The Internet of Things Authentication Cast Software as a Service Leadership GDPR Human Resources Students Remote Work Windows 10s Insurance Cryptocurrency Tools Hard Drives Data Management Remote Monitoring and Maintenance eWaste Wireless Internet Outlook Netflix Recovery Content Filter Multi-Factor Security Warranty Telephony Online Shopping Fiber-Optic Nanotechnology Government Users E-Commerce Staff Healthcare Regulations Computing Infrastructure SaaS Search Engine Practices Root Cause Analysis Safe Mode Current Events Line of Business Criminal Wire Frequently Asked Questions Specifications Cleaning Save Time Password Manager Storage Software Tips Trending Printer Accountants HVAC Skype Evernote Public Cloud Patch Management Cables Cortana webinar Risk Management Camera Digital Signature Electronic Health Records Audit Two Factor Authentication Content User Error CrashOverride Twitter Vendor Management Music Hybrid Cloud Bluetooth Politics Printers Assessment Public Speaking Hiring/Firing Audiobook Presentation Webinar Lithium-ion battery Wearable Technology Transportation Quick Tips Video Games Fun Internet exploMicrosoft Television Books Tech Support 5G IBM Automobile Files IT solutions Safety How to Benefits Office Worker Company Culture Advertising Public Computer Best Practice Colocation Loyalty Customer Relationship Management History Competition Troubleshooting Utility Computing Smart Technology Relocation Rootkit IP Address Scalability Managing Stress Search Emergency Employer Employee Relationship Customer Service Techology Shadow IT Hosted Solution Regulation Humor Mobile Office Experience Computer Accessories Internet Exlporer Domains

Mobile? Grab this Article!

QR-Code dieser Seite