In the Hands of Hackers Artificial Intelligence Can Be a Major Problem

In the Hands of Hackers Artificial Intelligence Can Be a Major Problem

As much as we personify the items in our life, we should remember that they are just that: items. However, technology has made it so that these items seem to be getting smarter through artificial intelligence. The first computer to play chess against a human opponent was introduced in 1956, and ever since, humanity has strived to make progress in the field of AI. In fact, AI is so valuable that even hackers are trying to take advantage of it.

At a recent technology expo, an experiment examined a competition between a human hacker and a sophisticated machine learning computer, where they both attempted to spear phish potential victims through Twitter. For two hours, a fierce battle waged where they attempted to outdo each other and craft the best phishing message. At about 1.075 tweets a minute, the human made 129 tweets, including 49 successful attempts. The computer made 810 tweets in the two hours, averaging about 6.75 tweets a minute and converting about 275 victims.

Humans might have achieved a higher victim-to-attempt percentage, but the machine managed to achieve five times as many victims in the same amount of time.

A Cylance poll held at ConFab asked attendees if hackers will use AI for meaningful purposes, and the answer might surprise you. 62 percent confirmed that they thought AI would be used by hackers on the offensive. Even if nobody could mention specific incidents, most believe that hackers have already attempted to use AI for their cybercrime. The unfortunate part of this is that AI is an ever-changing existence that has become a global problem. This makes it difficult to develop law enforcement strategies, as it’s difficult to find and prosecute perpetrators. Even if they can find them, it’s a case of whether or not there is legislation put into place to punish those who abuse this technology.

Worse yet, there are arguments among experts about what specifically defines artificial intelligence--especially with so many people using virtual assistants like Siri and Alexa. Some users might not classify these apps as AI, but they would be wrong.

Cybercriminals are always trying to use the most up-to-date technology, and AI is no exception. Hackers are using AI and machine learning to create programs that can personalize phishing emails containing malware attachments. In response to this threat, technology to distinguish real messages from the fake ones are developed. Cybersecurity is all about threats and hackers trying to outdo one another, which is why vulnerabilities are patched.

Would you consider using AI for your business? Let us know in the comments.

Tip of the Week: Change Your Default Browser's Dow...
Project Management: What You Need to Know


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, July 17, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Microsoft Business Computing Hackers Backup Managed Service Provider Productivity Workplace Tips Data Hardware Saving Money Business Malware Email IT Services IT Support Hosted Solutions Network Security Google Efficiency Small Business Smartphones Gadgets Quick Tips Mobile Devices User Tips Business Continuity Computer Disaster Recovery Mobile Office Network Virtualization Android Microsoft Office Innovation Server VoIP Social Media Mobile Device Management Smartphone Windows 10 Upgrade Miscellaneous Windows Ransomware Unified Threat Management Remote Monitoring Operating System Collaboration Communication Holiday Mobile Computing BYOD Remote Computing Passwords Managed IT services Cybersecurity WiFi Vendor Management Apps Data Backup Marketing Facebook Data Recovery IT Support The Internet of Things Users Analytics History Apple Firewall Data Management communications Alert Tech Term Automation Internet of Things BDR Productivity Phishing Artificial Intelligence Managed IT Services IT Consultant Outsourced IT App Save Money Content Filtering Going Green Mobile Device Bring Your Own Device Office Health Gmail Big data Bandwidth Spam Outlook Hiring/Firing Managed IT Windows 8 Hard Drives Best Practice Information Technology Lithium-ion Battery Cost Management Encryption Maintenance Printer Virus Tech Support Budget Wireless Technology Antivirus Search Browser Cybercrime Document Management Hacking IBM Computers Office 365 Travel Help Desk Update Phone System Recovery Employer-Employee Relationship Money Compliance Data storage Running Cable Training Proactive IT Humor Saving Time VPN It Management Networking Intranet Hard Drive Legal Education Business Technology Regulations Customer Service Two-factor Authentication Administration Cloud Computing Risk Management SaaS Government Website Save Time Windows 10 Law Enforcement Solid State Drive Comparison Tablet Fax Server Company Culture Telephone Systems Password Cortana Flexibility Excel Black Market Computer Repair Hacker Access Control Social Networking Laptop Customer Relationship Management Augmented Reality Business Growth PowerPoint Data Security Twitter User Applications Mobility Patch Management Blockchain Social Engineering Data Loss Paperless Office Wireless DDoS Disaster End of Support Data Breach Hosted Solution Business Intelligence Current Events Robot Digital Payment Avoiding Downtime Securty Downtime Project Management Word iPhone eWaste Machine Learning Start Menu Tech Terms Pain Points Taxes Mobile Technology Lifestyle Value Bluetooth Trending Distributed Denial of Service Software as a Service Mouse Public Cloud Uninterrupted Power Supply Cryptocurrency Vulnerabilities Processors Google Docs Programming Statistics Healthcare Network Congestion USB Bitcoin Identity Theft Experience Monitors Presentation Data Protection Cleaning Gaming Console Office Tips Google Maps Streaming Media Text Messaging Politics Virtual Desktop Webcam Virtual Reality Specifications Safety Emails Social YouTube Automobile Documents Sports Scam Unified Communications Settings Chromebook Heating/Cooling Redundancy Computing Net Neutrality Computing Infrastructure Hack Chrome How To Storage User Error Inbound Marketing Private Cloud Co-managed IT Download Router IT service Digital Telephony Websites Computer Accessories Retail Data Warehousing Upgrades Accountants Worker Public Speaking email scam Addiction Microchip Multi-factor Authentication Information Reading Samsung Shortcut Emergency Hard Drive Disposal LiFi LinkedIn Management Access Connected Devices Employer Employee Relationship Entrepreneur Microsoft Excel Wireless Headphones G Suite Troubleshooting Computer Care Migration Environment Google Drive Windows Server 2008 Deep Learning Best Practives Archive Equifax Licensing HIPAA Work/Life Balance Skype Network Management Upselling Hacks Physical Security Spyware Mobile Payment Device security Video Surveillance Relocation Tablets Competition Vulnerability Visible Light Communication Memory Banking Botnet Electronic Payment Point of Contact Desktop Microserver Finance File Sharing IT consulting Nanotechnology Saving ZTime Sync Business Owner Electricity Printing CCTV Windows 7 Startup IP Address Business Cards Service Level Agreement Notifications Human Resources cache Television CIO Get More Done Debate Reliable Computing Application Advertising Flash Unified Threat Management Backup and Disaster Recovery Harddrive Business Metrics Computer Malfunction Turn Key Analytic Gamification GPS Windows XP Recycling Printer Server Screen Reader In Internet of Things WannaCry Downloads Staffing Google Wallet Time Management Freedom of Information Displays Trojan Smart Tech External Harddrive Corporate Profile Society Piracy Product Reviews Upload Assessment SharePoint Micrsooft HTML Read Scalability Digital Signature Fiber-Optic Organize Database Motion Sickness Drones Mobile Security 3D Ebay Messenger Tracking Teamwork Tip of the week Conferencing Thin CLient Entertainment Google Calendar Rental Service Meetings Touchscreen News Device Management Multi-Factor Security Smart Phones VoIP Software License Trends PDF Consultation Evernote Content Management Devices Cabling Knowledge Permissions Language Fraud Business Managemenet Tactics Web Server UTM Content Adminstration Pirating Information Books Workers Best Available Keyboard Virtual Assistant Webinar Monitoring Leadership Wi-Fi Administrator Technology Tips Supercomputer Fake News switches Writing online Currency Legislation Domains Audit Music IT Plan Enterprise Resource Planning Productuvuty MSP 3D Printing Username Managing Stress CrashOverride Capital