Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Artificial Intelligence Can Be Useful To Hackers, Too

Artificial Intelligence Can Be Useful To Hackers, Too

Man matching wits with computer isn’t new territory. In 1830, a locomotive raced a horse to see which was superior in terms of speed and distance. 1956 saw the first time a human played chess against a computer. Today, the time has come when an artificial intelligence has begun to break into a new territory that was dominated by humans for thousands of years: crime.

At a recent technology expo, a human hacker and a sophisticated computer that is capable of machine learning each attempted to spear-phish as many victims as possible through Twitter. For two hours, both entities refined their message in an effort to be more effective against the target. At approximately 1.075 tweets per minute, the human was able to make 129 tweets, 49 of which were successful. The computer was able to make 810 tweets in two hours, which is about 6.75 tweets per minute. In that time, 275 victims were converted.

Even though humans had a higher attempt-to-victim percentage, the machine was able to get 5 times as many victims in the same amount of time.

In a Cylance poll held during ConFab, attendees were asked if criminal hackers will use AI for offensive purposes in the coming year, to which 62 percent answered in the affirmative. Even though no one could cite any specific incidents, the overwhelming consensus among experts is that hackers have already begun using AI. Like all high-tech crimes, AI is a global issue that changes fast and often, making it extremely difficult for law enforcement to find and prosecute perpetrators. Even when they’re able to identify offenders, they often run into issues where the laws and statutes are well behind the technology in question.

Another reason that identifying and combatting AI is so difficult is because there are constant debates among experts around the globe on what exactly constitutes as AI. Think about it like this: millions of people consult virtual assistants, like Siri and Alexa, every day. However, if you ask the majority of them if they were using artificial intelligence, they’d say ‘No.’ In reality, they are both examples of AI being put to use to enhance the lives of its users.

There are a lot of potential uses for AI by cyber criminals. For example, hackers could use machine learning capabilities to write programs that personalize emails with malware attachments. As that technology is developed, there will likely be a time when distinguishing actual email and phishing attacks is nearly impossible. Another probable use of machine learning and AI for hacking is drastically reducing the time and resources it takes to find and exploit vulnerabilities in software though automation.

For a small business, AI might not be not something that you need to concern yourself with - and perhaps it isn't, at the moment. However, AI is already being incorporated into many aspects of business with great success and many experts feel it will be very important in the near future. What do you think? Would you be willing to give AI a try? Let us know in the comments!

How Remote Monitoring and Management Can Help Your...
Ransomware is Especially Dangerous for Small Busin...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 19 April 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Privacy Cloud Technology Hackers Network Security Business Computing Backup Hosted Solutions Managed IT Services Malware Disaster Recovery Google Software VoIP Microsoft Business Mobile Devices Business Continuity Email Internet Productivity Outsourced IT Data Innovation Ransomware Smartphones Cybercrime Efficiency IT Support Windows 10 Android Computer Data Backup Hardware Browser communications Cloud Computing IT Services Office Telephone Systems Computers Server Alert User Tips Mobile Device Management Data Recovery Business Management Windows Small Business Virtualization Saving Money Smartphone Network Chrome BDR Cybersecurity Quick Tips Upgrade BYOD Social Engineering Internet of Things Miscellaneous Recovery Passwords Workplace Tips App Managed IT Firewall Private Cloud Mobility Hacking Work/Life Balance Avoiding Downtime Office Tips How To Productivity Microsoft Office Collaboration Holiday Save Money Law Enforcement Social Media Password Business Intelligence Health Information Technology Redundancy Flexibility Two-factor Authentication Wi-Fi VPN Communication Bandwidth Data Management Data Protection Bring Your Own Device Phishing Facebook Managed Service Provider Data Security Operating System Gmail Remote Monitoring Proactive IT Money Office 365 Budget HaaS Value Safety Tech Term Identity Theft Windows 10 Gadgets Risk Management Apps Router Employer-Employee Relationship Compliance Black Market Google Drive Data Breach Spam Cleaning Big Data SaaS Vulnerability Managed IT Services Marketing Artificial Intelligence User Error Automation Business Owner Workers Entertainment Keyboard The Internet of Things Encryption Scam Document Management Wearable Technology Public Cloud Save Time Remote Computing Credit Cards Wireless Technology CES IT Management Automobile Worker Word OneNote PDF IT Plan Computing Infrastructure Legal DDoS Unsupported Software Battery Physical Security Mobile Computing Training Mobile Device Comparison Meetings Content Filtering Wireless Downtime Applications Spam Blocking Apple Charger History Data loss Electronic Medical Records Solid State Drive eWaste Update Best Practice Shadow IT Hiring/Firing Data storage Government Settings HIPAA Computer Care End of Support Internet Exlporer Samsung Patch Management Data Storage Accountants SharePoint Remote Work Computer Accessories Humor Tip of the week iPhone Mobile Computer Fan Advertising Voice over Internet Protocol How to Knowledge Recycling Sports Bluetooth Monitor Windows Server 2008 Loyalty People Professional Services Experience NarrowBand FENG Techology Wireless Charging Notifications Criminal Fax Server Multi-Factor Security Transportation Data Warehousing Network Congestion Windows 7 Emails IoT Reputation Files Mobile Office Tools Music Fiber-Optic Hybrid Cloud IT solutions Trending Benefits Customer Regulations Smart Tech Fraud Assessment Colocation USB Chromecast Cables IT Consultant Content Management Lifestyle Smart Technology Insurance Amazon Rootkit Antivirus Television Botnet Troubleshooting Unified Communications Uninterrupted Power Supply Leadership Blockchain Servers Content Netflix Practices Amazon Web Services Public Computer hacker Travel Hosted Solution Root Cause Analysis Theft Human Resources Distributed Denial of Service WiFi Two Factor Authentication Software Tips Education Flash Audiobook Hosted Computing Online Shopping Vendor Management Cortana webinar Staff Specifications Sync Politics Inventory Hard Drives Evernote Networking Software as a Service Going Green Video Games Google Apps Tech Support Conferencing Digital Signature Mouse Millennials Robot HBO Users Relocation Telephony Windows 10s Unified Threat Management IBM Books Laptop Screen Mirroring Scalability Infrastructure IT Support Strategy Workforce Frequently Asked Questions Virtual Reality Skype IaaS Lithium-ion battery Environment Running Cable Supercomputer Google Docs Emergency Touchpad Cast Instant Messaging Password Manager Analysis Streaming Media Telecommuting Employer Employee Relationship Outlook Excel Worker Commute Start Menu YouTube Audit Current Events Internet exploMicrosoft Website Search Business Mangement Webinar IT solutions CrashOverride Administration Thank You Congratulations Access Control Authentication

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!