XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, April 21 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Data Small Business Hackers Google Mobile Devices Hardware VoIP Productivity Network Security Mobile Office Malware Email Gadgets Quick Tips Efficiency Business Management Network Innovation IT Services IT Support Social Media Business Smartphones Business Continuity Server Miscellaneous User Tips Communications Communication Upgrade Virtualization Windows Disaster Recovery Data Backup Computer Users Microsoft Office Managed IT Services Data Recovery Passwords Smartphone Android Mobile Device Management Browser Internet of Things Productivity Holiday Marketing Save Money WiFi Alert Tech Term Vendor Management Ransomware Outsourced IT Cybersecurity Cloud Computing Operating System Artificial Intelligence Mobile Computing BDR Cybercrime Router Windows 10 Chrome Remote Monitoring Bring Your Own Device Apple Remote Computing BYOD Information Technology Computers Collaboration Avoiding Downtime Automation Spam Managed IT Services Big Data Firewall Going Green IT Solutions The Internet of Things Current Events Health VPN Best Practice History Telephone Systems Social Engineering Proactive IT Wireless Technology Printer Employer-Employee Relationship Facebook IT Consultant Trending Application Phishing Windows 10 Hacking Phone System App Lithium-ion Battery Encryption Office Mobile Device Budget Mobility Bandwidth Money Excel Training IT Support Mouse Networking Office 365 Content Filtering Applications Business Intelligence Two-factor Authentication How To Business Managament Unified Threat Management Fax Server Recovery Maintenance Windows 8 iPhone Private Cloud Redundancy Blockchain Law Enforcement Word Gmail Antivirus User Error Data Security Humor Settings Outlook Apps Analytics Tutorials File Sharing Access Control Virus Google Drive PowerPoint Managed IT Information Sports Save Time Value Customer Relationship Management Data Protection Website Hard Drives Business Technology Inbound Marketing Education Scam Social Vulnerability Data Management Streaming Media Risk Management Connectivity Compliance Flexibility Entertainment Administration Identity Theft Saving Time Wireless Augmented Reality Retail Digital Payment Human Resources Social Networking Voice over Internet Protocol Downtime Computer Repair IT Management Memory Servers Display Network Congestion Hacker Conferencing Machine Learning Administrator Analysis Wi-Fi Search Software as a Service Tablet Twitter Tech Support Managed Service Office Tips Meetings Document Management Paperless Office Virtual Private Network Update Data Storage Statistics DDoS Solid State Drive Comparison Keyboard Telephony Virtual Assistant Work/Life Balance Touchscreen Data Breach Black Market Windows 7 Programming Google Docs Staff Skype Instant Messaging Botnet Cleaning Password Running Cable Workers Physical Security Intranet Healthcare Environment Telephone System Wearable Technology Public Cloud Biometrics Video Surveillance Credit Cards SaaS Net Neutrality IT service Data loss Best Available Smart Tech Data storage Webinar Cryptocurrency Piracy Fraud Bluetooth IBM Spam Blocking CES Internet Exlporer IT Plan People Help Desk Leadership eWaste Samsung Manufacturing PDF Robot Computer Accessories Safety USB HaaS End of Support Content Management YouTube Unsupported Software Government Infrastructure Online Currency Point of Sale Recycling OneNote Accountants Windows Media Player Virtual Desktop Cryptomining Windows Server 2008 Amazon Web Services IT Security Addiction Hiring/Firing Internet exploMicrosoft ISP NarrowBand Software Tips Remote Work Print Server Wiring Hosted Solution Password Manager Enterprise Content Management Macro Employee/Employer Relationship Cost Management Text Messaging Computer Care Uninterrupted Power Supply nternet Crowdfunding Hosted Computing Proactive Work Station 5G Customers Remote Support Unified Communications Students Co-managed IT Upgrades Bing Gaming Console Analyitcs Customer Service Database Online Shopping Cache Project Management Audit Advertising File Versioning Chromecast Law Firm IT Devices GDPR Consultant Netflix Distributed Denial of Service Files Business Mangement Company Culture Password Management Data Warehousing Specifications Inventory Remote Monitoring and Maintenance OLED Start Menu Theft Shortcuts Root Cause Analysis Smartwatch IoT Cameras Supercomputer Distribution Regulations Evernote Wireless Internet Warranty Computer Fan Notifications Digital Signature LinkedIn Multiple Versions Laptop HBO Thought Leadership Licensing E-Commerce Colocation Travel Criminal NIST Employee Shadow IT Millennials Line of Business WIndows 7 SharePoint Mobile Cortana Windows 8.1 Update Electronic Health Records eCommerce Virtual Reality Printer Server Shortcut Knowledge Logistics Wireless Charging Wire Microchip Webcam FENG Hybrid Cloud Multi-Factor Security Strategy Worker Commute Restore Data Touchpad Frequently Asked Questions Debate Content Filter Camera User Patch Management IaaS Computing Infrastructure Digital Signage Legal Workforce Authentication MSP Managing Stress 360 Domains Emails Relocation Professional Services Google Apps Vendor Bloatware Screen Mirroring Insurance PC Care Monitor Flash Fiber-Optic Smart Office Science Electronic Medical Records Lifestyle Safe Mode 3D Business Owner Backup and Disaster Recovery Tip of the week Amazon Storage Scheduling Windows 10s Google Search Telecommuting Nanotechnology Remote Worker Tools HVAC Security Cameras Entrepreneur eBay Charger Cast Practices HIPAA Alerts Biometric Security Reputation Sync Cables Search Engine Tablets Hiring/Firing Automobile Public Computer Battery Benefits Video Games IT solutions Employer Employee Relationship CrashOverride Smart Technology Loyalty Scalability Books Experience Content Two Factor Authentication How to Emergency Techology Music Worker Regulation Audiobook Assessment Rootkit Thank You Politics Utility Computing Television Printers Transportation Troubleshooting Webinar Congratulations

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *