Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

In the Hands of Hackers Artificial Intelligence Can Be a Major Problem

In the Hands of Hackers Artificial Intelligence Can Be a Major Problem

As much as we personify the items in our life, we should remember that they are just that: items. However, technology has made it so that these items seem to be getting smarter through artificial intelligence. The first computer to play chess against a human opponent was introduced in 1956, and ever since, humanity has strived to make progress in the field of AI. In fact, AI is so valuable that even hackers are trying to take advantage of it.

At a recent technology expo, an experiment examined a competition between a human hacker and a sophisticated machine learning computer, where they both attempted to spear phish potential victims through Twitter. For two hours, a fierce battle waged where they attempted to outdo each other and craft the best phishing message. At about 1.075 tweets a minute, the human made 129 tweets, including 49 successful attempts. The computer made 810 tweets in the two hours, averaging about 6.75 tweets a minute and converting about 275 victims.

Humans might have achieved a higher victim-to-attempt percentage, but the machine managed to achieve five times as many victims in the same amount of time.

A Cylance poll held at ConFab asked attendees if hackers will use AI for meaningful purposes, and the answer might surprise you. 62 percent confirmed that they thought AI would be used by hackers on the offensive. Even if nobody could mention specific incidents, most believe that hackers have already attempted to use AI for their cybercrime. The unfortunate part of this is that AI is an ever-changing existence that has become a global problem. This makes it difficult to develop law enforcement strategies, as it’s difficult to find and prosecute perpetrators. Even if they can find them, it’s a case of whether or not there is legislation put into place to punish those who abuse this technology.

Worse yet, there are arguments among experts about what specifically defines artificial intelligence--especially with so many people using virtual assistants like Siri and Alexa. Some users might not classify these apps as AI, but they would be wrong.

Cybercriminals are always trying to use the most up-to-date technology, and AI is no exception. Hackers are using AI and machine learning to create programs that can personalize phishing emails containing malware attachments. In response to this threat, technology to distinguish real messages from the fake ones are developed. Cybersecurity is all about threats and hackers trying to outdo one another, which is why vulnerabilities are patched.

Would you consider using AI for your business? Let us know in the comments.

Tip of the Week: Change Your Default Browser's Dow...
Project Management: What You Need to Know


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 21 April 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Business Computing Software Hackers Backup Managed Service Provider Productivity Workplace Tips Data Hardware Business Saving Money Malware Email IT Support IT Services Hosted Solutions Google Network Security Small Business Efficiency Quick Tips Smartphones Gadgets Mobile Devices User Tips Business Continuity Computer Disaster Recovery Virtualization Mobile Office Network Microsoft Office VoIP Social Media Server Smartphone Android Mobile Device Management Upgrade Windows 10 Innovation Miscellaneous Unified Threat Management Windows Ransomware Remote Monitoring Holiday Operating System Remote Computing Mobile Computing Passwords WiFi Collaboration Vendor Management BYOD Communication Apps Marketing The Internet of Things Facebook Users History Cybersecurity Apple Firewall Managed IT services Analytics Data Management IT Support Productivity Alert communications Internet of Things Phishing Managed IT Services Save Money Outsourced IT IT Consultant Office Health Automation Gmail Big data App Content Filtering BDR Spam Bring Your Own Device Wireless Technology Search Tech Support Bandwidth Hiring/Firing Lithium-ion Battery Browser Outlook Hard Drives Maintenance Antivirus Virus Artificial Intelligence Data Recovery Managed IT Budget Information Technology Best Practice Going Green Mobile Device Windows 8 Data Backup Hacking Printer Update Office 365 Money Encryption Recovery Employer-Employee Relationship Help Desk Cost Management Phone System IBM Saving Time SaaS Humor Intranet Save Time It Management Hard Drive Running Cable Networking Government Proactive IT Cybercrime Training Risk Management Computers VPN Administration Law Enforcement Data storage Two-factor Authentication Customer Service Cloud Computing Legal Document Management Website Travel Education Hosted Solution Robot Compliance Avoiding Downtime Social Engineering User Black Market Mobility Current Events Digital Payment Excel Business Growth DDoS Windows 10 Comparison Augmented Reality Telephone Systems PowerPoint Social Networking Word Disaster End of Support Cortana Password Access Control Twitter Hacker Securty Downtime Data Security Solid State Drive Tablet Flexibility iPhone Company Culture Data Loss Business Intelligence Laptop Wireless Data Breach Project Management Fax Server Computer Repair Mobile Technology Computing Experience Statistics eWaste Value Identity Theft Distributed Denial of Service IT service Public Cloud Tech Term Bitcoin Virtual Reality Streaming Media Inbound Marketing Bluetooth Business Technology Blockchain Computing Infrastructure Chrome Safety Specifications Pain Points Automobile Social Scam User Error Router Monitors Computer Accessories Network Congestion Telephony How To Customer Relationship Management Digital YouTube Mouse Websites Gaming Console Start Menu Settings Unified Communications Tech Terms Text Messaging Webcam Taxes Software as a Service Uninterrupted Power Supply Processors Politics USB Data Protection Presentation Google Maps Net Neutrality Patch Management Cryptocurrency Virtual Desktop Emails Google Docs Co-managed IT Documents Redundancy Programming Hack Cleaning Heating/Cooling Office Tips Regulations Private Cloud Trending Paperless Office Lifestyle Sports Retail Vulnerabilities Relocation Worker Machine Learning Device security Emergency Read Computer Care Microsoft Excel External Harddrive Point of Contact Shortcut Troubleshooting Business Cards Google Drive Notifications Employer Employee Relationship Reliable Computing Mobile Payment Licensing Staffing Environment Thin CLient Vulnerability Printing Electricity Smart Phones Botnet Get More Done Music Competition Upgrades Business Owner Piracy Printer Server Television LiFi HTML Leadership Downloads WannaCry Computer Malfunction Application Deep Learning Device Management Software License Time Management Rental Service SharePoint Memory Visible Light Communication Devices Google Calendar Digital Signature Tip of the week Wi-Fi Motion Sickness Webinar online Currency Entertainment IT Plan Touchscreen Upselling Tracking Evernote Flash Advertising Accountants Knowledge Technology Tips Virtual Assistant Web Server Google Wallet Displays Migration Analytic Workers Data Warehousing Equifax Public Speaking Hard Drive Disposal GPS Access Banking Best Practives Drones Desktop File Sharing Samsung Windows Server 2008 Microserver Language G Suite Permissions Entrepreneur Startup Ebay HIPAA Unified Threat Management 3D Spyware Business Managemenet Business Metrics Physical Security Tablets Writing switches Recycling Electronic Payment Applications Smart Tech Windows 7 Turn Key Sync IP Address Pirating Information Fiber-Optic Adminstration cache Chromebook CCTV Trojan Organize Human Resources Mobile Security Messenger Multi-Factor Security Freedom of Information Corporate Profile Work/Life Balance In Internet of Things Content Management Fraud Assessment Skype Download Books Scalability IT consulting UTM Legislation Teamwork News VoIP CIO Video Surveillance Storage email scam Consultation Microchip Meetings Reading Cabling LinkedIn Windows XP PDF Multi-factor Authentication Saving ZTime Wireless Headphones Audit Best Available Fake News Administrator Society Keyboard Micrsooft Archive Domains Debate Product Reviews Harddrive Hacks Supercomputer Nanotechnology Productuvuty CrashOverride 3D Printing Capital