Contact us today!
845-876-6561

Professional Computer Associates Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Know Your Tech: A/B Testing
Attempts to Make Smart Cities Hit a Snag
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 26 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Network Security Hackers Business Computing Malware Backup Hosted Solutions Managed IT Services Google VoIP Email Mobile Devices Disaster Recovery Microsoft Innovation Software Data Internet Productivity Outsourced IT Business Continuity Business Data Backup communications Efficiency Cybercrime Smartphones Ransomware Hardware IT Services IT Support Computer Windows 10 Data Recovery Tech Term Cloud Computing Android Browser Internet of Things Saving Money BDR Office Computers Server Workplace Tips User Tips Network Windows Alert Business Management Telephone Systems Save Money Applications Virtualization Smartphone Cybersecurity Miscellaneous Mobile Device Management Artificial Intelligence Upgrade Small Business Social Media Quick Tips Managed IT Chrome Facebook Social Engineering Communication Passwords Microsoft Office Law Enforcement Firewall Collaboration BYOD Bandwidth Gadgets Productivity Money Office Tips Hacking Mobility Managed Service Provider App Recovery Router Automation Work/Life Balance How To Avoiding Downtime Holiday Private Cloud Password Office 365 Redundancy Windows 10 Two-factor Authentication Data Management HaaS Flexibility Wi-Fi Remote Monitoring Managed IT Services Data Protection Operating System Information Technology Bring Your Own Device Phishing Gmail Business Intelligence Budget VPN Training Proactive IT Data Security Health Connectivity Document Management Employer-Employee Relationship Data Breach Marketing User Error IT Management Word Entertainment IT Support Big Data Vulnerability Encryption Mobile Computing Apps Black Market Sports Cleaning Compliance Analysis Safety Spam Blockchain Google Drive Mobile Device SaaS Risk Management Settings Identity Theft Value Public Cloud Data loss Shadow IT Windows 7 Scam History Streaming Media Content Filtering Credit Cards DDoS Charger Internet Exlporer YouTube OneNote Save Time Update Networking Information Electronic Medical Records Data storage Solid State Drive IT Plan Meetings PDF Unified Threat Management Government File Sharing Access Control The Internet of Things End of Support Automobile Worker Wireless CES Wearable Technology Computing Infrastructure Managed Service Hiring/Firing Infrastructure Unsupported Software USB Apple Smart Tech Servers Data Storage HIPAA Computer Care Instant Messaging Website Content Management Physical Security Legal Workers Machine Learning eWaste Battery Samsung Comparison Remote Computing Virtual Assistant Wireless Technology Patch Management Business Owner Spam Blocking Education Best Practice Downtime Paperless Office Keyboard Antivirus Evernote Chromecast GDPR Audiobook Vendor Management Multi-Factor Security Human Resources Cryptocurrency Emails IaaS Going Green Line of Business Tools Bluetooth Software as a Service Recycling Reputation Techology Conferencing HBO Hosted Computing Windows 10s Telephony Cortana Addiction Robot Hard Drives Students Experience Loyalty Millennials Files Transportation Wireless Charging Devices Hybrid Cloud Cache E-Commerce Screen Mirroring Politics SharePoint Trending Staff Relocation Video Games Safe Mode Regulations Fraud Inventory Laptop MSP WiFi Criminal Uninterrupted Power Supply Customer HVAC Frequently Asked Questions Skype Users Google Apps Distributed Denial of Service Healthcare IT Consultant Music Workforce IoT Colocation Benefits Fiber-Optic Thought Leadership Wireless Internet Supercomputer Cast Lifestyle Digital Signature Scalability Amazon Touchpad Augmented Reality Botnet Google Docs Enterprise Content Management Excel Books IBM People Audit Start Menu Virtual Reality Fax Server Outlook Electronic Health Records Leadership Assessment Telecommuting Notifications Netflix Smart Technology Cables Content Filter Wire Current Events Strategy Business Technology Amazon Web Services Authentication NarrowBand Internet exploMicrosoft Remote Worker Root Cause Analysis Travel Rootkit Password Management Tip of the week Emergency Mobile Office hacker Proactive Computer Fan Mobile Worker Commute Employer Employee Relationship IT solutions Password Manager Mouse Humor Software Tips Troubleshooting Television Remote Work Insurance Flash Unified Communications Storage Smart Office Knowledge iPhone Search Online Shopping Nanotechnology Advertising Wiring Content Voice over Internet Protocol Tech Support NIST Windows Server 2008 Remote Monitoring and Maintenance FENG Professional Services Computer Accessories Business Mangement Monitor webinar Hosted Solution Public Computer Environment Practices Sync Two Factor Authentication Running Cable Theft Network Congestion Data Warehousing Specifications Accountants Lithium-ion battery How to Telephone System Managing Stress Regulation Webinar Printers IT solutions CrashOverride Thank You Congratulations Administration Company Culture Twitter

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!