Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Artificial Intelligence Can Be Useful To Hackers, Too

Artificial Intelligence Can Be Useful To Hackers, Too

Man matching wits with computer isn’t new territory. In 1830, a locomotive raced a horse to see which was superior in terms of speed and distance. 1956 saw the first time a human played chess against a computer. Today, the time has come when an artificial intelligence has begun to break into a new territory that was dominated by humans for thousands of years: crime.

At a recent technology expo, a human hacker and a sophisticated computer that is capable of machine learning each attempted to spear-phish as many victims as possible through Twitter. For two hours, both entities refined their message in an effort to be more effective against the target. At approximately 1.075 tweets per minute, the human was able to make 129 tweets, 49 of which were successful. The computer was able to make 810 tweets in two hours, which is about 6.75 tweets per minute. In that time, 275 victims were converted.

Even though humans had a higher attempt-to-victim percentage, the machine was able to get 5 times as many victims in the same amount of time.

In a Cylance poll held during ConFab, attendees were asked if criminal hackers will use AI for offensive purposes in the coming year, to which 62 percent answered in the affirmative. Even though no one could cite any specific incidents, the overwhelming consensus among experts is that hackers have already begun using AI. Like all high-tech crimes, AI is a global issue that changes fast and often, making it extremely difficult for law enforcement to find and prosecute perpetrators. Even when they’re able to identify offenders, they often run into issues where the laws and statutes are well behind the technology in question.

Another reason that identifying and combatting AI is so difficult is because there are constant debates among experts around the globe on what exactly constitutes as AI. Think about it like this: millions of people consult virtual assistants, like Siri and Alexa, every day. However, if you ask the majority of them if they were using artificial intelligence, they’d say ‘No.’ In reality, they are both examples of AI being put to use to enhance the lives of its users.

There are a lot of potential uses for AI by cyber criminals. For example, hackers could use machine learning capabilities to write programs that personalize emails with malware attachments. As that technology is developed, there will likely be a time when distinguishing actual email and phishing attacks is nearly impossible. Another probable use of machine learning and AI for hacking is drastically reducing the time and resources it takes to find and exploit vulnerabilities in software though automation.

For a small business, AI might not be not something that you need to concern yourself with - and perhaps it isn't, at the moment. However, AI is already being incorporated into many aspects of business with great success and many experts feel it will be very important in the near future. What do you think? Would you be willing to give AI a try? Let us know in the comments!

How Remote Monitoring and Management Can Help Your...
Ransomware is Especially Dangerous for Small Busin...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 October 2017

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Technology Backup Business Computing Network Security Malware Hosted Solutions Disaster Recovery Managed IT Services Business Continuity Microsoft Software Mobile Devices Google Business VoIP Productivity Windows 10 Data Internet IT Support Efficiency Computer Hardware Outsourced IT Innovation Smartphones Cybercrime Office IT Services Browser Email Ransomware Server Alert Android Saving Money communications Telephone Systems Mobile Device Management Quick Tips Computers Upgrade Business Management User Tips Save Money Virtualization Windows Microsoft Office Law Enforcement Network Managed IT Recovery Cybersecurity Small Business Mobility Social Media Miscellaneous BYOD Chrome Passwords Workplace Tips Avoiding Downtime Hacking App Data Backup Firewall Proactive IT Facebook Budget Operating System HaaS Collaboration Flexibility Information Technology Office 365 Health Smartphone Private Cloud Social Engineering Productivity Office Tips Managed Service Provider Bandwidth Remote Monitoring Communication SaaS Money Password Phishing How To Automation Spam Gmail Safety Holiday Cloud Computing Wi-Fi Redundancy BDR Marketing User Error Work/Life Balance Managed IT Services Data Management Black Market Data Breach Bring Your Own Device Google Drive Downtime Cleaning Solid State Drive Hiring/Firing DDoS Word Employer-Employee Relationship History Computer Care Best Practice Artificial Intelligence Data storage Shadow IT Samsung Unsupported Software Patch Management Meetings Government Business Owner Wireless End of Support Internet Exlporer Value Apple Data Security Spam Blocking The Internet of Things Save Time Settings Worker Automobile Public Cloud Remote Computing Wireless Technology Entertainment Router Compliance Battery Gadgets Data Storage Wearable Technology Computing Infrastructure Physical Security Applications Internet of Things VPN Risk Management Windows 10 Two-factor Authentication Unified Threat Management IT Management Antivirus Regulations Scalability IBM Books Virtual Reality OneNote Going Green IT Consultant Robot Tech Support HIPAA IT Plan Emergency Instant Messaging Relocation Supercomputer Employer Employee Relationship Distributed Denial of Service Botnet Worker Commute WiFi Laptop Leadership Servers Search Netflix Current Events IaaS Computer Accessories Travel Root Cause Analysis Touchpad Outlook Keyboard Software Tips Scam Flash How to YouTube Bluetooth Mouse Data Recovery Document Management Internet exploMicrosoft Techology webinar Humor Loyalty Experience eWaste Transportation Sync iPhone Software as a Service Data loss Advertising HBO Conferencing Monitor Sports Lithium-ion battery Music Environment Benefits Running Cable Telephony Windows 10s NarrowBand Streaming Media Update Screen Mirroring Frequently Asked Questions IT Support Reputation Assessment USB Smart Technology Skype Apps Vulnerability Files Rootkit SharePoint Cast Hybrid Cloud Excel Legal Customer Television Encryption Troubleshooting Start Menu Audit Colocation Chromecast Training Content PDF Tip of the week Mobile Device People Workers Public Computer Notifications Hosted Solution Two Factor Authentication Mobile Education Fax Server Computer Fan Knowledge Uninterrupted Power Supply Vendor Management Audiobook Business Intelligence Windows Server 2008 Mobile Office Mobile Computing Content Filtering Professional Services IT solutions FENG hacker Network Congestion Charger Politics Data Warehousing Hard Drives Windows 7 Video Games Emails Networking Big Data Electronic Medical Records Tools Users Webinar IT solutions CrashOverride Thank You Congratulations Google Docs Website Administration

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!