XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, January 17 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Hackers Data Small Business Google Hardware Mobile Devices Productivity VoIP Mobile Office Malware Email Gadgets Quick Tips Network Security Efficiency Network Innovation IT Support IT Services Social Media Business Business Management Business Continuity Smartphones Server Miscellaneous Upgrade Communication Virtualization User Tips Windows Disaster Recovery Data Backup Communications Computer Managed IT Services Microsoft Office Smartphone Users Data Recovery Mobile Device Management Browser Passwords Android Holiday WiFi Marketing Save Money Outsourced IT Alert Tech Term Ransomware Cybercrime Internet of Things Vendor Management BDR Mobile Computing Cloud Computing Operating System Remote Monitoring Windows 10 Router Chrome Information Technology Automation Avoiding Downtime Bring Your Own Device Artificial Intelligence Apple Computers BYOD Going Green Best Practice History Telephone Systems Cybersecurity Spam VPN Big Data Remote Computing Firewall IT Solutions The Internet of Things Current Events Managed IT Services Hacking Social Engineering Employer-Employee Relationship Printer Facebook Phone System Wireless Technology Trending Application IT Consultant Health Collaboration Bandwidth Money Excel Proactive IT App Productivity Office Windows 10 Budget Mobility Lithium-ion Battery Maintenance Windows 8 Unified Threat Management How To Networking Office 365 Business Intelligence Applications iPhone Two-factor Authentication Phishing Mouse Business Managament Content Filtering IT Support Recovery Fax Server Mobile Device Value Apps Sports Private Cloud Website Information Redundancy PowerPoint Law Enforcement Gmail Encryption Data Protection Antivirus Blockchain User Error Settings Customer Relationship Management Word Training Analytics Humor Hard Drives Outlook Data Security Google Drive Tutorials Virus Managed IT Access Control Tablet Social Networking Wi-Fi Search Servers Save Time Digital Payment Computer Repair Twitter Machine Learning Office Tips Document Management Tech Support Data Management Streaming Media Risk Management Software as a Service Compliance Analysis Scam Flexibility Administrator Entertainment Managed Service Saving Time Retail Connectivity Human Resources Social Downtime Inbound Marketing File Sharing Memory Identity Theft Network Congestion Hacker Conferencing Voice over Internet Protocol Vulnerability Administration IT Management End of Support Robot Smart Tech Safety Work/Life Balance Data Breach USB HaaS CES YouTube Fraud Video Surveillance Government Online Currency Point of Sale IT Plan Meetings Recycling Workers Education Content Management IBM Statistics Piracy DDoS Leadership Solid State Drive Unsupported Software Data loss Infrastructure Skype Black Market Programming Paperless Office Update Spam Blocking Instant Messaging Computer Accessories Environment Cleaning Password Running Cable Wireless Physical Security Augmented Reality Intranet Public Cloud Comparison Wearable Technology Telephony Google Docs Biometrics Virtual Assistant Windows 7 SaaS IT service Botnet Best Available OneNote Data storage Display Telephone System Bluetooth Webinar Touchscreen Internet Exlporer People Credit Cards Data Storage eWaste PDF Samsung Help Desk Keyboard Multi-Factor Security Strategy Audit Wireless Charging Wire Microchip Netflix Entrepreneur Cryptocurrency Frequently Asked Questions Content Filter Camera Vendor Workforce Root Cause Analysis Authentication MSP Reputation Professional Services Google Apps Tablets Internet exploMicrosoft Lifestyle Computer Fan Windows Media Player Virtual Desktop Insurance Webcam IT Security Flash Fiber-Optic Supercomputer Hiring/Firing Smart Office Cost Management Safe Mode NarrowBand Print Server Tip of the week Amazon Storage Analyitcs HVAC Security Cameras Uninterrupted Power Supply nternet Crowdfunding Telecommuting Nanotechnology Remote Worker Customers Remote Support Tools Macro Upgrades Advertising FENG Customer Service Practices Sync Cables Knowledge Co-managed IT Search Engine PC Care Patch Management Accountants Business Technology Scheduling Chromecast Law Firm IT Windows Server 2008 Amazon Web Services Consultant Addiction Virtual Private Network 3D Distributed Denial of Service Files Company Culture Enterprise Content Management Software Tips Remote Work Screen Mirroring Wiring eBay Password Manager 360 Emails Alerts Notifications LinkedIn Electronic Medical Records Cameras Hosted Computing Proactive Unified Communications Students Bing Net Neutrality Staff Windows 10s Laptop Online Shopping Business Owner Licensing Cache Project Management Colocation Virtual Reality Password Management Shadow IT Charger Cast WIndows 7 Devices GDPR Text Messaging SharePoint Windows 8.1 Update Business Mangement Shortcuts Work Station Hybrid Cloud Data Warehousing Specifications Hiring/Firing Printer Server Shortcut Inventory Remote Monitoring and Maintenance Gaming Console Start Menu Theft HIPAA Healthcare Digital Signature Worker Commute IoT Touchpad Debate Regulations Evernote User Wireless Internet Warranty IaaS Computing Infrastructure Hosted Solution Bloatware NIST Legal HBO Computer Care Managing Stress Domains Thought Leadership E-Commerce Relocation Travel Criminal Electronic Health Records eCommerce Millennials Line of Business Monitor Mobile Cortana Science Thank You Smart Technology Regulation Books Loyalty Experience Congratulations Two Factor Authentication Battery Content Utility Computing Emergency Video Games Printers Worker Music Audiobook Scalability Assessment Employee/Employer Relationship Rootkit Politics Transportation How to Television Webinar Techology Troubleshooting Smartwatch Benefits Automobile Public Computer IT solutions Employer Employee Relationship CrashOverride

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *