Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Artificial Intelligence Can Be Useful To Hackers, Too

Artificial Intelligence Can Be Useful To Hackers, Too

Man matching wits with computer isn’t new territory. In 1830, a locomotive raced a horse to see which was superior in terms of speed and distance. 1956 saw the first time a human played chess against a computer. Today, the time has come when an artificial intelligence has begun to break into a new territory that was dominated by humans for thousands of years: crime.

At a recent technology expo, a human hacker and a sophisticated computer that is capable of machine learning each attempted to spear-phish as many victims as possible through Twitter. For two hours, both entities refined their message in an effort to be more effective against the target. At approximately 1.075 tweets per minute, the human was able to make 129 tweets, 49 of which were successful. The computer was able to make 810 tweets in two hours, which is about 6.75 tweets per minute. In that time, 275 victims were converted.

Even though humans had a higher attempt-to-victim percentage, the machine was able to get 5 times as many victims in the same amount of time.

In a Cylance poll held during ConFab, attendees were asked if criminal hackers will use AI for offensive purposes in the coming year, to which 62 percent answered in the affirmative. Even though no one could cite any specific incidents, the overwhelming consensus among experts is that hackers have already begun using AI. Like all high-tech crimes, AI is a global issue that changes fast and often, making it extremely difficult for law enforcement to find and prosecute perpetrators. Even when they’re able to identify offenders, they often run into issues where the laws and statutes are well behind the technology in question.

Another reason that identifying and combatting AI is so difficult is because there are constant debates among experts around the globe on what exactly constitutes as AI. Think about it like this: millions of people consult virtual assistants, like Siri and Alexa, every day. However, if you ask the majority of them if they were using artificial intelligence, they’d say ‘No.’ In reality, they are both examples of AI being put to use to enhance the lives of its users.

There are a lot of potential uses for AI by cyber criminals. For example, hackers could use machine learning capabilities to write programs that personalize emails with malware attachments. As that technology is developed, there will likely be a time when distinguishing actual email and phishing attacks is nearly impossible. Another probable use of machine learning and AI for hacking is drastically reducing the time and resources it takes to find and exploit vulnerabilities in software though automation.

For a small business, AI might not be not something that you need to concern yourself with - and perhaps it isn't, at the moment. However, AI is already being incorporated into many aspects of business with great success and many experts feel it will be very important in the near future. What do you think? Would you be willing to give AI a try? Let us know in the comments!

How Remote Monitoring and Management Can Help Your...
Ransomware is Especially Dangerous for Small Busin...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 21 January 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Technology Backup Business Computing Network Security Malware Managed IT Services Hosted Solutions Disaster Recovery Google Microsoft VoIP Business Continuity Business Software Mobile Devices Outsourced IT Productivity Email Smartphones Windows 10 Data Internet Efficiency communications Computer Hardware IT Support Innovation Cybercrime Android Office Ransomware Alert Data Backup Server IT Services Browser Telephone Systems Windows Small Business Saving Money Computers Business Management User Tips Mobile Device Management Quick Tips Chrome Social Engineering Upgrade Save Money Virtualization Law Enforcement Network Recovery Microsoft Office BDR Holiday Collaboration Managed IT BYOD Cybersecurity Cloud Computing Hacking Smartphone Social Media Mobility Miscellaneous Work/Life Balance Office Tips Workplace Tips Passwords Avoiding Downtime App Firewall How To Data Recovery Bandwidth HaaS Facebook Budget Operating System Health Information Technology Password Private Cloud Office 365 Flexibility Wi-Fi Two-factor Authentication Bring Your Own Device Managed Service Provider Communication Proactive IT Productivity Money Employer-Employee Relationship Remote Monitoring Automation Safety Artificial Intelligence Managed IT Services Value Redundancy Gmail Gadgets User Error Marketing Windows 10 Data Management Black Market Router Internet of Things Google Drive Compliance Data Breach Phishing SaaS Risk Management Spam Shadow IT Data Security Data storage Government Spam Blocking End of Support Solid State Drive DDoS Internet Exlporer Hiring/Firing Computer Care The Internet of Things Meetings Vulnerability Wireless Samsung Apple Patch Management Business Owner Data Storage Public Cloud Keyboard Remote Computing Scam Workers Wireless Technology Business Intelligence Identity Theft Settings Save Time Credit Cards Worker Computing Infrastructure Automobile IT Management Entertainment Physical Security Apps Mobile Computing OneNote Word Battery Wearable Technology Cleaning Unsupported Software Downtime Mobile Device History Content Filtering Applications VPN Charger Best Practice Specifications Networking Google Apps Big Data webinar Video Games Users Evernote Antivirus IaaS Sync Electronic Medical Records Unified Threat Management Data loss Touchpad Software as a Service Millennials IBM HBO Infrastructure Books Conferencing Outlook Scalability Virtual Reality YouTube Telephony Windows 10s WiFi Screen Mirroring Internet exploMicrosoft HIPAA Distributed Denial of Service Update Workforce Supercomputer Frequently Asked Questions Password Manager Emergency IT Support Humor Instant Messaging iPhone Worker Commute Skype Employer Employee Relationship Google Docs Cast Advertising Sports Telecommuting Current Events Excel Monitor Search Audit NarrowBand Start Menu Computer Accessories Website Mouse Remote Work eWaste Tip of the week Reputation How to Bluetooth Computer Fan Files Document Management Mobile Voice over Internet Protocol Loyalty Wireless Charging Hybrid Cloud Experience Knowledge Techology Customer Lithium-ion battery Environment Windows Server 2008 Transportation FENG Colocation Chromecast Running Cable Professional Services Multi-Factor Security Data Warehousing Fiber-Optic PDF Music Network Congestion Streaming Media Windows 7 Benefits Emails Tools Uninterrupted Power Supply Trending SharePoint Assessment Cables USB Encryption Fraud Regulations Smart Technology Rootkit hacker Lifestyle Television IT Plan Unified Communications Troubleshooting IT Consultant Legal Notifications Amazon People Training Content Botnet Fax Server Data Protection Public Computer Theft Hosted Solution Leadership Education Amazon Web Services Servers Mobile Office Two Factor Authentication Netflix Vendor Management Root Cause Analysis Audiobook Going Green Travel IT solutions Tech Support Comparison Software Tips Cortana Robot Relocation Online Shopping Flash Politics Laptop Hard Drives Thank You Business Mangement Congratulations Recycling Webinar IT solutions CrashOverride Administration

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!