XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, September 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Workplace Tips Managed Service Provider Business Computing Small Business Hackers Hosted Solutions Data Productivity Google Hardware Mobile Devices Mobile Office VoIP Email Gadgets Quick Tips Malware Network Efficiency IT Support Network Security Innovation Social Media Business Management IT Services Miscellaneous Business Continuity Smartphones Server Virtualization Upgrade Business Windows Disaster Recovery Communication Managed IT Services Microsoft Office Communications Users Computer Passwords Data Backup User Tips Mobile Device Management Android Browser Save Money Marketing Smartphone Alert WiFi Holiday Data Recovery Ransomware Mobile Computing Tech Term Vendor Management Remote Monitoring Outsourced IT Cybercrime Internet of Things Operating System Windows 10 Avoiding Downtime BDR Computers Bring Your Own Device Cloud Computing Apple BYOD Information Technology VPN Current Events Big Data Telephone Systems Chrome Remote Computing History Best Practice IT Solutions Automation Router The Internet of Things Artificial Intelligence Going Green Firewall Spam Application Phone System Health Cybersecurity Collaboration Wireless Technology Hacking Trending IT Consultant Social Engineering Employer-Employee Relationship Facebook Budget Managed IT Services Proactive IT Lithium-ion Battery Bandwidth Excel App Printer Office Money Mobility Business Managament iPhone Business Intelligence Recovery Fax Server Maintenance Content Filtering Windows 8 How To Applications Networking Unified Threat Management Two-factor Authentication Managed IT Tutorials Virus Customer Relationship Management Antivirus Hard Drives Training Mouse Private Cloud Redundancy Analytics Law Enforcement Office 365 Website Apps Data Protection Phishing Windows 10 Gmail User Error Sports Value PowerPoint Humor Data Security Outlook Streaming Media Risk Management Network Congestion IT Management Saving Time Inbound Marketing Save Time Data Management Downtime Analysis Tech Support Administration Productivity File Sharing Office Tips Memory Mobile Device Encryption Social Networking Compliance Conferencing Digital Payment Computer Repair Blockchain Connectivity Flexibility Word Entertainment Search Tablet IT Support Retail Twitter Google Drive Settings Document Management Vulnerability Identity Theft Education Biometrics Data Storage Internet Exlporer Computer Accessories eWaste IT service Statistics PDF Work/Life Balance Data Breach Hacker Webinar Access Control Credit Cards Programming Safety Wi-Fi Smart Tech Skype HaaS End of Support Social YouTube Workers Government Servers Machine Learning CES Augmented Reality Intranet Meetings Running Cable USB Wearable Technology Information IT Plan Robot Touchscreen DDoS Data loss Solid State Drive Content Management Paperless Office Infrastructure Scam Black Market Spam Blocking Managed Service Unsupported Software Best Available Bluetooth Cleaning Password Update Video Surveillance Wireless Physical Security People Public Cloud Samsung Virtual Assistant Comparison Instant Messaging SaaS IBM Environment Online Currency Piracy OneNote Windows 7 Recycling Human Resources Administrator Data storage Point of Sale Leadership Start Menu Theft Licensing IT Security Touchpad Hosted Solution IoT Telephone System Data Warehousing Specifications PC Care IaaS Computing Infrastructure Computer Care Wireless Internet Scheduling Legal Keyboard NIST Voice over Internet Protocol Digital Signature Virtual Reality 3D Relocation Thought Leadership E-Commerce Regulations Evernote WIndows 7 Print Server Electronic Health Records Travel Criminal Remote Support eBay Monitor Audit Line of Business HBO Printer Server nternet Shortcut Crowdfunding Mobile Cortana User Netflix Millennials Worker Commute Alerts Wire Domains Help Desk Cryptocurrency Multi-Factor Security Strategy Bloatware Company Culture Content Filter Root Cause Analysis Wireless Charging Managing Stress Law Firm IT Supercomputer Science Text Messaging Reputation Authentication Computer Fan MSP Frequently Asked Questions Fraud Professional Services Google Apps Gaming Console Insurance Workforce LinkedIn Work Station Internet exploMicrosoft Smart Office NarrowBand Safe Mode Lifestyle Entrepreneur Net Neutrality Storage Flash Fiber-Optic Uninterrupted Power Supply Knowledge HVAC Software as a Service Tablets Windows 8.1 Update Customers Nanotechnology FENG Remote Worker Tip of the week Amazon Tools Hiring/Firing Display Patch Management Practices Telecommuting Windows Media Player Virtual Desktop Advertising Cables Debate Chromecast 360 Accountants Emails Business Technology Cost Management Macro Distributed Denial of Service Files Addiction Screen Mirroring Sync Enterprise Content Management Upgrades Analyitcs Co-managed IT Electronic Medical Records Wiring Windows Server 2008 Amazon Web Services Business Owner Students Password Manager Hosted Computing Windows 10s Proactive Software Tips Remote Work Customer Service Notifications Telephony Unified Communications Consultant Webcam Laptop Colocation Charger Cache Cast Shadow IT HIPAA Password Management Google Docs Staff SharePoint Hiring/Firing Devices GDPR Online Shopping Hybrid Cloud Healthcare Botnet Business Mangement Inventory Remote Monitoring and Maintenance Cameras IT solutions Employer Employee Relationship CrashOverride Smart Technology Books Regulation Loyalty Experience Camera Content Two Factor Authentication Thank You Battery Emergency Video Games Music Worker Printers Congratulations Audiobook Assessment Scalability Rootkit Politics Television Transportation How to Troubleshooting Webinar Techology Automobile Public Computer Benefits

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *