XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Software Workplace Tips Managed Service Provider Business Computing Data Hackers Small Business Hardware Hosted Solutions Google Mobile Devices Productivity Mobile Office VoIP Gadgets Email Malware Quick Tips Network Network Security Innovation Efficiency IT Support Social Media Business Management Business IT Services Server Smartphones Miscellaneous Business Continuity Upgrade Virtualization Communication Windows Disaster Recovery Data Backup Computer Communications User Tips Microsoft Office Managed IT Services Users Mobile Device Management Passwords Browser Android Data Recovery Marketing Save Money WiFi Smartphone Alert Holiday Ransomware Vendor Management BDR Outsourced IT Mobile Computing Cybercrime Tech Term Internet of Things Windows 10 Operating System Chrome Remote Monitoring Bring Your Own Device Apple Cloud Computing BYOD Information Technology Computers Avoiding Downtime Firewall Router Big Data Going Green Remote Computing IT Solutions Current Events The Internet of Things Artificial Intelligence History Best Practice Telephone Systems VPN Automation Cybersecurity Spam Facebook Employer-Employee Relationship IT Consultant Health Trending Application Collaboration Hacking Managed IT Services Phone System Social Engineering Wireless Technology Printer Proactive IT Office Budget Excel Bandwidth App Money Lithium-ion Battery Content Filtering How To Business Intelligence Productivity Business Managament Two-factor Authentication Mobility Windows 10 Fax Server Unified Threat Management Maintenance Recovery Windows 8 iPhone Mouse Networking Applications Blockchain Gmail Humor Outlook Antivirus Tutorials Apps Virus Data Security Analytics Information Phishing Managed IT PowerPoint Private Cloud Customer Relationship Management Value Redundancy Sports Hard Drives Law Enforcement Training Website Office 365 Data Protection Encryption User Error Flexibility Entertainment Word Administration Saving Time Retail Mobile Device Settings Social Networking Google Drive Identity Theft Digital Payment Computer Repair Downtime Analysis Network Congestion File Sharing Memory IT Management Administrator Conferencing Servers IT Support Tech Support Vulnerability Save Time Connectivity Data Management Tablet Scam Search Twitter Office Tips Document Management Inbound Marketing Streaming Media Risk Management Compliance Update Telephone System Statistics Wireless Physical Security Touchscreen Cleaning Password Programming Comparison Data loss Public Cloud Access Control Skype Instant Messaging SaaS Smart Tech Environment Windows 7 Augmented Reality Intranet Human Resources Running Cable Spam Blocking Wearable Technology Machine Learning Video Surveillance Webinar Biometrics Data storage Voice over Internet Protocol IT service eWaste Hacker Credit Cards Internet Exlporer Piracy PDF Best Available IBM OneNote HaaS End of Support Managed Service Leadership Safety Wi-Fi Bluetooth Paperless Office Government Fraud YouTube People CES Meetings USB IT Plan Data Storage Computer Accessories Samsung Robot Keyboard DDoS Online Currency Virtual Assistant Work/Life Balance Data Breach Content Management Recycling Unsupported Software Solid State Drive Point of Sale Infrastructure Social Workers Black Market Education Computer Fan Gaming Console Distributed Denial of Service Files IoT Upgrades Analyitcs Windows Server 2008 Supercomputer Amazon Web Services Work Station Chromecast Print Server Wireless Internet Warranty Remote Support NIST Software Tips Remote Work nternet Thought Leadership Crowdfunding E-Commerce Customer Service Password Manager Electronic Health Records Consultant Notifications Line of Business Telephony Unified Communications Google Docs FENG Staff Colocation Company Culture Knowledge Online Shopping Laptop Law Firm IT Wire Microchip SharePoint Cryptocurrency Shadow IT Content Filter Camera Cameras Patch Management Botnet Business Mangement Licensing Data Warehousing Specifications Screen Mirroring Hybrid Cloud Authentication LinkedIn MSP 360 Start Menu Emails Theft Electronic Medical Records Digital Signature IaaS Computing Infrastructure Insurance Net Neutrality Virtual Reality Regulations Evernote Touchpad Smart Office WIndows 7 Webcam Relocation Windows 8.1 Update Safe Mode Help Desk Business Owner HBO Legal Storage Printer Server Shortcut Travel Windows 10s Criminal Display HVAC User Charger Millennials Cast Nanotechnology Remote Worker Worker Commute Mobile Cortana Monitor Domains Hiring/Firing Multi-Factor Security Strategy Practices Bloatware HIPAA Wireless Charging Debate Search Engine Managing Stress Accountants Business Technology Science Frequently Asked Questions PC Care Addiction Virtual Private Network Reputation Enterprise Content Management Computer Care Workforce 3D Wiring Hosted Solution Professional Services Google Apps Scheduling Lifestyle eBay Internet exploMicrosoft Hosted Computing Proactive Entrepreneur Flash Fiber-Optic Students Bing Tablets Tip of the week Amazon Alerts NarrowBand Cache Project Management Macro Software as a Service Audit Customers Password Management Hiring/Firing Telecommuting Uninterrupted Power Supply Devices GDPR Windows Media Player Co-managed IT Virtual Desktop Tools Netflix Root Cause Analysis Text Messaging Advertising Inventory Remote Monitoring and Maintenance Cost Management Sync Cables IT Security Healthcare Content Scalability Two Factor Authentication Emergency Worker Music Regulation Audiobook How to Assessment Techology Rootkit Politics Utility Computing Television Printers Transportation Thank You Troubleshooting Webinar Automobile Public Computer Benefits Congratulations IT solutions Employer Employee Relationship CrashOverride Battery Video Games Smart Technology Loyalty Books Experience

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *
      • Company Name
      • First Name *
      • Last Name *
      • Phone *
      • Phone Ext.
      • Comments:
      • Yes, subscribe me to: