Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

In the Hands of Hackers Artificial Intelligence Can Be a Major Problem

In the Hands of Hackers Artificial Intelligence Can Be a Major Problem

As much as we personify the items in our life, we should remember that they are just that: items. However, technology has made it so that these items seem to be getting smarter through artificial intelligence. The first computer to play chess against a human opponent was introduced in 1956, and ever since, humanity has strived to make progress in the field of AI. In fact, AI is so valuable that even hackers are trying to take advantage of it.

At a recent technology expo, an experiment examined a competition between a human hacker and a sophisticated machine learning computer, where they both attempted to spear phish potential victims through Twitter. For two hours, a fierce battle waged where they attempted to outdo each other and craft the best phishing message. At about 1.075 tweets a minute, the human made 129 tweets, including 49 successful attempts. The computer made 810 tweets in the two hours, averaging about 6.75 tweets a minute and converting about 275 victims.

Humans might have achieved a higher victim-to-attempt percentage, but the machine managed to achieve five times as many victims in the same amount of time.

A Cylance poll held at ConFab asked attendees if hackers will use AI for meaningful purposes, and the answer might surprise you. 62 percent confirmed that they thought AI would be used by hackers on the offensive. Even if nobody could mention specific incidents, most believe that hackers have already attempted to use AI for their cybercrime. The unfortunate part of this is that AI is an ever-changing existence that has become a global problem. This makes it difficult to develop law enforcement strategies, as it’s difficult to find and prosecute perpetrators. Even if they can find them, it’s a case of whether or not there is legislation put into place to punish those who abuse this technology.

Worse yet, there are arguments among experts about what specifically defines artificial intelligence--especially with so many people using virtual assistants like Siri and Alexa. Some users might not classify these apps as AI, but they would be wrong.

Cybercriminals are always trying to use the most up-to-date technology, and AI is no exception. Hackers are using AI and machine learning to create programs that can personalize phishing emails containing malware attachments. In response to this threat, technology to distinguish real messages from the fake ones are developed. Cybersecurity is all about threats and hackers trying to outdo one another, which is why vulnerabilities are patched.

Would you consider using AI for your business? Let us know in the comments.

Tip of the Week: Change Your Default Browser's Dow...
Project Management: What You Need to Know


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 20 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Software Workplace Tips Backup Business Computing Hackers Productivity Data Saving Money Hardware Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Quick Tips Smartphones Small Business Gadgets Business Continuity Mobile Devices User Tips Mobile Office Disaster Recovery Computer Network Security Network Virtualization Microsoft Office Server VoIP Windows 10 Miscellaneous Upgrade Social Media Mobile Device Management Windows Unified Threat Management Ransomware Android Smartphone Operating System Remote Computing Innovation Passwords BYOD Communication Remote Monitoring WiFi Vendor Management Mobile Computing Apps The Internet of Things Marketing Holiday Collaboration Facebook Managed IT services Users Firewall History Apple Data Management Analytics Save Money IT Consultant Outsourced IT IT Support Alert Big data Managed IT Services Health Content Filtering Productivity Phishing Automation Bring Your Own Device Office Virus App Lithium-ion Battery communications Hard Drives Budget Windows 8 Managed IT Artificial Intelligence Tech Support Best Practice BDR Spam Going Green Hiring/Firing Outlook Wireless Technology Search Browser Employer-Employee Relationship Encryption Update Data Backup Phone System Cybersecurity Help Desk Antivirus Printer Information Technology IBM Internet of Things Gmail Recovery Maintenance Proactive IT It Management Customer Service Law Enforcement Computers Data storage Travel Education Humor Legal Save Time Money SaaS Mobile Device Document Management Running Cable Bandwidth Saving Time Government Administration Word Risk Management Password Networking Cost Management Hacker Telephone Systems Digital Payment Training Tablet Disaster PowerPoint Two-factor Authentication Social Networking Securty Wireless Fax Server Hard Drive VPN Solid State Drive Website Mobility Twitter Flexibility Windows 10 Avoiding Downtime iPhone Hacking Business Intelligence Office 365 Current Events User Hosted Solution Data Recovery Computer Repair DDoS Intranet Black Market Cybercrime Cloud Computing Streaming Media Hack Inbound Marketing Business Growth Project Management Cortana Telephony Monitors Chrome YouTube Processors Router Downtime Settings Computer Accessories USB Unified Communications Comparison Presentation Co-managed IT Customer Relationship Management Company Culture End of Support Public Cloud Augmented Reality Virtual Desktop Programming Lifestyle Politics Documents Text Messaging Heating/Cooling Scam Automobile Retail Google Docs Laptop Experience How To Net Neutrality Office Tips Start Menu Paperless Office Pain Points Taxes Software as a Service Sports User Error Access Control Uninterrupted Power Supply Computing Excel Trending Safety Robot Social IT service Gaming Console Statistics Patch Management Google Maps Network Congestion Compliance Webcam Redundancy Rental Service Deep Learning Microserver Scalability Analytic Visible Light Communication Data Breach VoIP Memory Consultation Public Speaking Wi-Fi Meetings Leadership Cabling Turn Key Private Cloud Flash Administrator Device Management Advertising Trojan Audit Entrepreneur Supercomputer HIPAA Google Wallet Organize Business Managemenet Emergency Worker Electronic Payment Displays Machine Learning Distributed Denial of Service Computer Care online Currency Google Drive IP Address Banking Employer Employee Relationship Drones Human Resources File Sharing Licensing Language Botnet Mouse Permissions Printing Electricity Business Metrics Skype switches GPS Business Technology Writing Harddrive Computer Malfunction Teamwork Downloads WannaCry Time Management Chromebook Storage 3D Messenger PDF External Harddrive Ebay Keyboard Work/Life Balance Motion Sickness Recycling Best Available Cryptocurrency Google Calendar Touchscreen Domains Download Tracking Product Reviews Pirating Information Read IT consulting Get More Done Adminstration Knowledge Books eWaste Smart Phones Shortcut Web Server Value Cleaning Printer Server Technology Tips Digital Websites Microchip Workers Troubleshooting CIO Windows XP Tech Terms Staffing Reading Content Management Environment Regulations Competition Society Access Hacks Samsung Business Owner Micrsooft Video Surveillance Relocation Mobile Technology G Suite LinkedIn Application Identity Theft Upselling Physical Security Webinar Saving ZTime Spyware Notifications Tablets Specifications Debate Data Security Reliable Computing Data Protection Mobile Payment Archive Sync Virtual Reality CCTV Digital Signature Music cache Social Engineering Point of Contact Entertainment Upgrades LiFi Best Practives Data Loss Corporate Profile Bluetooth In Internet of Things Assessment Computing Infrastructure Emails Thin CLient Capital Productuvuty Vulnerability CrashOverride 3D Printing Television

hp supplies medallionLarge2017