Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Artificial Intelligence Can Be Useful To Hackers, Too

Artificial Intelligence Can Be Useful To Hackers, Too

Man matching wits with computer isn’t new territory. In 1830, a locomotive raced a horse to see which was superior in terms of speed and distance. 1956 saw the first time a human played chess against a computer. Today, the time has come when an artificial intelligence has begun to break into a new territory that was dominated by humans for thousands of years: crime.

At a recent technology expo, a human hacker and a sophisticated computer that is capable of machine learning each attempted to spear-phish as many victims as possible through Twitter. For two hours, both entities refined their message in an effort to be more effective against the target. At approximately 1.075 tweets per minute, the human was able to make 129 tweets, 49 of which were successful. The computer was able to make 810 tweets in two hours, which is about 6.75 tweets per minute. In that time, 275 victims were converted.

Even though humans had a higher attempt-to-victim percentage, the machine was able to get 5 times as many victims in the same amount of time.

In a Cylance poll held during ConFab, attendees were asked if criminal hackers will use AI for offensive purposes in the coming year, to which 62 percent answered in the affirmative. Even though no one could cite any specific incidents, the overwhelming consensus among experts is that hackers have already begun using AI. Like all high-tech crimes, AI is a global issue that changes fast and often, making it extremely difficult for law enforcement to find and prosecute perpetrators. Even when they’re able to identify offenders, they often run into issues where the laws and statutes are well behind the technology in question.

Another reason that identifying and combatting AI is so difficult is because there are constant debates among experts around the globe on what exactly constitutes as AI. Think about it like this: millions of people consult virtual assistants, like Siri and Alexa, every day. However, if you ask the majority of them if they were using artificial intelligence, they’d say ‘No.’ In reality, they are both examples of AI being put to use to enhance the lives of its users.

There are a lot of potential uses for AI by cyber criminals. For example, hackers could use machine learning capabilities to write programs that personalize emails with malware attachments. As that technology is developed, there will likely be a time when distinguishing actual email and phishing attacks is nearly impossible. Another probable use of machine learning and AI for hacking is drastically reducing the time and resources it takes to find and exploit vulnerabilities in software though automation.

For a small business, AI might not be not something that you need to concern yourself with - and perhaps it isn't, at the moment. However, AI is already being incorporated into many aspects of business with great success and many experts feel it will be very important in the near future. What do you think? Would you be willing to give AI a try? Let us know in the comments!

How Remote Monitoring and Management Can Help Your...
Ransomware is Especially Dangerous for Small Busin...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 21 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Network Security Hackers Business Computing Backup Hosted Solutions Malware Managed IT Services Google VoIP Microsoft Disaster Recovery Mobile Devices Software Productivity Business Internet Business Continuity Email Data Innovation Outsourced IT Data Backup communications Cybercrime Efficiency Ransomware Computer IT Support Smartphones Windows 10 Cloud Computing Hardware IT Services Browser Data Recovery Android Internet of Things BDR Office Saving Money Computers Server Business Management Telephone Systems Alert Windows Tech Term Cybersecurity Smartphone Upgrade Virtualization User Tips Mobile Device Management Network Small Business Quick Tips Managed IT BYOD Chrome Workplace Tips Social Engineering Save Money Law Enforcement Microsoft Office Collaboration Private Cloud Office 365 Social Media Hacking Miscellaneous Mobility Passwords Work/Life Balance Router App Office Tips Managed Service Provider Firewall Avoiding Downtime Communication Productivity Bandwidth Money How To Facebook Recovery Artificial Intelligence Password Holiday Business Intelligence Flexibility Wi-Fi Data Management Bring Your Own Device Two-factor Authentication Data Protection VPN Applications Proactive IT Phishing Remote Monitoring Data Security HaaS Automation Operating System Budget Gmail Health Information Technology Redundancy Marketing User Error Gadgets Identity Theft Blockchain Entertainment Black Market Apps Windows 10 Word Google Drive Compliance Cleaning Mobile Device Risk Management Data Breach SaaS Employer-Employee Relationship Big Data Spam Connectivity Safety Vulnerability Value Managed IT Services Document Management Workers Content Management Streaming Media Save Time PDF Worker Computing Infrastructure Automobile Encryption Credit Cards USB Windows 7 Physical Security Mobile Computing IT Management Wearable Technology Legal Battery OneNote Training IT Plan Downtime Education Access Control History Unsupported Software Content Filtering Servers Infrastructure Best Practice Charger Comparison Data storage DDoS Shadow IT Networking Electronic Medical Records Analysis Government End of Support Solid State Drive Spam Blocking Internet Exlporer Hiring/Firing Data loss YouTube Meetings Computer Care HIPAA Wireless Paperless Office Update The Internet of Things Apple Samsung IT Support Sports Patch Management Business Owner eWaste Public Cloud Keyboard CES Remote Computing Scam Settings Website Smart Tech Data Storage Wireless Technology Running Cable Loyalty Remote Work Content Filter Hybrid Cloud Experience Tip of the week Cables Techology Mobile Customer Computer Fan Electronic Health Records Transportation Business Technology Voice over Internet Protocol Insurance Colocation Chromecast Knowledge Storage Music Windows Server 2008 Unified Communications Professional Services FENG SharePoint Machine Learning Benefits Virtual Assistant Multi-Factor Security Practices Data Warehousing Network Congestion Emails Uninterrupted Power Supply Assessment Theft Tools Human Resources Smart Technology Telephone System People Rootkit Trending Hosted Computing hacker Notifications Fax Server Television Fraud Addiction Troubleshooting Regulations Cortana Staff Mobile Office Lifestyle Inventory Content IT Consultant IT solutions Public Computer Amazon Cache Hosted Solution Google Apps Two Factor Authentication Botnet Digital Signature HVAC Vendor Management Audiobook Going Green Leadership Robot Netflix Tech Support Amazon Web Services Wireless Internet Travel Strategy Relocation Root Cause Analysis Enterprise Content Management Authentication Politics Software Tips Laptop Hard Drives Antivirus Video Games Online Shopping Wire Flash Password Manager Users IaaS Password Management Unified Threat Management Specifications Nanotechnology Touchpad webinar Outlook Scalability Distributed Denial of Service WiFi IBM Evernote Smart Office Books Sync Business Mangement Software as a Service Accountants Virtual Reality NIST Millennials Internet exploMicrosoft HBO Conferencing Humor Instant Messaging Windows 10s Supercomputer Emergency Telephony Recycling Cryptocurrency Employer Employee Relationship iPhone Worker Commute Screen Mirroring Workforce Devices Advertising Frequently Asked Questions Wireless Charging Criminal Monitor Search Mouse Current Events Students Skype Safe Mode Computer Accessories Google Docs IoT Cast NarrowBand Telecommuting Thought Leadership Excel Fiber-Optic Start Menu Reputation How to Audit Healthcare File Sharing Bluetooth Files Lithium-ion battery Environment Twitter Company Culture Webinar Managing Stress Administration IT solutions CrashOverride Thank You Congratulations

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!