Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

In the Hands of Hackers Artificial Intelligence Can Be a Major Problem

In the Hands of Hackers Artificial Intelligence Can Be a Major Problem

As much as we personify the items in our life, we should remember that they are just that: items. However, technology has made it so that these items seem to be getting smarter through artificial intelligence. The first computer to play chess against a human opponent was introduced in 1956, and ever since, humanity has strived to make progress in the field of AI. In fact, AI is so valuable that even hackers are trying to take advantage of it.

At a recent technology expo, an experiment examined a competition between a human hacker and a sophisticated machine learning computer, where they both attempted to spear phish potential victims through Twitter. For two hours, a fierce battle waged where they attempted to outdo each other and craft the best phishing message. At about 1.075 tweets a minute, the human made 129 tweets, including 49 successful attempts. The computer made 810 tweets in the two hours, averaging about 6.75 tweets a minute and converting about 275 victims.

Humans might have achieved a higher victim-to-attempt percentage, but the machine managed to achieve five times as many victims in the same amount of time.

A Cylance poll held at ConFab asked attendees if hackers will use AI for meaningful purposes, and the answer might surprise you. 62 percent confirmed that they thought AI would be used by hackers on the offensive. Even if nobody could mention specific incidents, most believe that hackers have already attempted to use AI for their cybercrime. The unfortunate part of this is that AI is an ever-changing existence that has become a global problem. This makes it difficult to develop law enforcement strategies, as it’s difficult to find and prosecute perpetrators. Even if they can find them, it’s a case of whether or not there is legislation put into place to punish those who abuse this technology.

Worse yet, there are arguments among experts about what specifically defines artificial intelligence--especially with so many people using virtual assistants like Siri and Alexa. Some users might not classify these apps as AI, but they would be wrong.

Cybercriminals are always trying to use the most up-to-date technology, and AI is no exception. Hackers are using AI and machine learning to create programs that can personalize phishing emails containing malware attachments. In response to this threat, technology to distinguish real messages from the fake ones are developed. Cybersecurity is all about threats and hackers trying to outdo one another, which is why vulnerabilities are patched.

Would you consider using AI for your business? Let us know in the comments.

Tip of the Week: Change Your Default Browser's Dow...
Project Management: What You Need to Know
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 20 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Managed Service Provider Hackers Business Computing Workplace Tips Productivity Backup Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Quick Tips Smartphones Small Business Gadgets Network Security User Tips Mobile Devices Business Continuity Computer Mobile Office Disaster Recovery Network Virtualization Microsoft Office Server VoIP Social Media Mobile Device Management Miscellaneous Upgrade Windows 10 Windows Android Unified Threat Management Ransomware Smartphone Holiday Passwords Operating System Remote Computing Innovation Vendor Management Mobile Computing BYOD Communication Remote Monitoring WiFi Marketing Collaboration Apps Facebook The Internet of Things History Managed IT services Firewall Users Analytics Apple IT Support Data Management Alert Cybersecurity Phishing IT Consultant Managed IT Services Save Money Outsourced IT Office App Automation Gmail Productivity Content Filtering Big data Health Bring Your Own Device Wireless Technology Managed IT Budget Search Outlook Lithium-ion Battery Virus Hard Drives Hiring/Firing Artificial Intelligence Windows 8 Browser Best Practice Going Green BDR Spam Tech Support communications Update Data Backup Maintenance Internet of Things Bandwidth Help Desk Office 365 Money Phone System Antivirus Encryption Recovery Employer-Employee Relationship Information Technology Printer IBM Cost Management Mobile Device Saving Time Data storage Customer Service Travel Legal Education Administration SaaS Save Time It Management Proactive IT Hard Drive Computers Running Cable Government Networking Humor Risk Management Document Management Law Enforcement Tablet Current Events Solid State Drive Excel Intranet Flexibility Two-factor Authentication Wireless Project Management Website Digital Payment Comparison Hacking Hosted Solution PowerPoint Robot Social Networking Mobility User VPN Twitter Black Market Windows 10 DDoS Fax Server Business Growth iPhone Business Intelligence Word Telephone Systems Training Cortana Password Data Recovery Disaster Hacker Avoiding Downtime End of Support Computer Repair Securty Politics Presentation Pain Points Statistics Company Culture Virtual Desktop Cloud Computing User Error Hack Programming Streaming Media Cryptocurrency Documents Inbound Marketing Heating/Cooling Google Docs Laptop Gaming Console Webcam Chrome Office Tips Retail Distributed Denial of Service Paperless Office Router Experience eWaste Public Cloud Computer Accessories Sports Customer Relationship Management Computing Augmented Reality Mouse IT service Text Messaging Scam Social Engineering Automobile Compliance Co-managed IT Safety Specifications Social Computing Infrastructure How To Network Congestion Digital Lifestyle Bitcoin Telephony Start Menu Net Neutrality Monitors Taxes Cybercrime Software as a Service Access Control Uninterrupted Power Supply YouTube Unified Communications Settings Data Security Trending Downtime Processors Patch Management Google Maps USB switches Data Loss IP Address Corporate Profile Writing In Internet of Things Emails Point of Contact Human Resources Data Warehousing Assessment Redundancy Chromebook Scalability Hard Drive Disposal Thin CLient Data Breach Messenger VoIP Upselling Skype Webinar Work/Life Balance Meetings Windows Server 2008 Consultation Download Cabling Teamwork Private Cloud Unified Threat Management IT consulting Leadership Audit Books Storage Administrator Supercomputer Cleaning Windows 7 PDF Fiber-Optic Emergency Keyboard Microchip Worker Best Available Machine Learning Best Practives Device Management CIO Windows XP Computer Care Domains Reading Regulations Product Reviews Employer Employee Relationship Read Microserver Society Freedom of Information Google Drive Fraud Vulnerability Shortcut Hacks Licensing Value online Currency Micrsooft Printing Relocation Electricity Troubleshooting Botnet Identity Theft Turn Key Staffing News Environment email scam Business Technology Competition Notifications Trojan Organize Downloads Reliable Computing WannaCry Business Owner Computer Malfunction Time Management Virtual Reality Music Fake News GPS Vulnerabilities Application Upgrades Motion Sickness LiFi Google Calendar Mobile Technology Bluetooth Touchscreen Tracking Ebay Microsoft Excel 3D Business Cards Knowledge Rental Service Digital Signature Deep Learning Recycling Web Server Visible Light Communication Technology Tips Mobile Payment Entertainment Memory Websites Wi-Fi Workers Pirating Information Adminstration Tech Terms Harddrive Analytic Advertising Television Access Flash Samsung External Harddrive Content Management Google Wallet Blockchain Public Speaking Displays G Suite Physical Security SharePoint Spyware Entrepreneur Banking Tablets Smart Phones Drones Get More Done Video Surveillance Tip of the week Saving ZTime File Sharing Data Protection HIPAA LinkedIn Sync Business Managemenet Printer Server Language CCTV Permissions Evernote cache Electronic Payment Business Metrics Archive Debate Virtual Assistant Capital 3D Printing Productuvuty CrashOverride Piracy Software License

hp supplies medallionLarge2017