In the Hands of Hackers Artificial Intelligence Can Be a Major Problem

In the Hands of Hackers Artificial Intelligence Can Be a Major Problem

As much as we personify the items in our life, we should remember that they are just that: items. However, technology has made it so that these items seem to be getting smarter through artificial intelligence. The first computer to play chess against a human opponent was introduced in 1956, and ever since, humanity has strived to make progress in the field of AI. In fact, AI is so valuable that even hackers are trying to take advantage of it.

At a recent technology expo, an experiment examined a competition between a human hacker and a sophisticated machine learning computer, where they both attempted to spear phish potential victims through Twitter. For two hours, a fierce battle waged where they attempted to outdo each other and craft the best phishing message. At about 1.075 tweets a minute, the human made 129 tweets, including 49 successful attempts. The computer made 810 tweets in the two hours, averaging about 6.75 tweets a minute and converting about 275 victims.

Humans might have achieved a higher victim-to-attempt percentage, but the machine managed to achieve five times as many victims in the same amount of time.

A Cylance poll held at ConFab asked attendees if hackers will use AI for meaningful purposes, and the answer might surprise you. 62 percent confirmed that they thought AI would be used by hackers on the offensive. Even if nobody could mention specific incidents, most believe that hackers have already attempted to use AI for their cybercrime. The unfortunate part of this is that AI is an ever-changing existence that has become a global problem. This makes it difficult to develop law enforcement strategies, as it’s difficult to find and prosecute perpetrators. Even if they can find them, it’s a case of whether or not there is legislation put into place to punish those who abuse this technology.

Worse yet, there are arguments among experts about what specifically defines artificial intelligence--especially with so many people using virtual assistants like Siri and Alexa. Some users might not classify these apps as AI, but they would be wrong.

Cybercriminals are always trying to use the most up-to-date technology, and AI is no exception. Hackers are using AI and machine learning to create programs that can personalize phishing emails containing malware attachments. In response to this threat, technology to distinguish real messages from the fake ones are developed. Cybersecurity is all about threats and hackers trying to outdo one another, which is why vulnerabilities are patched.

Would you consider using AI for your business? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 20 November 2017

Captcha Image

Request a Free Consultation

  • Company name *
  • First Name *
  • Last Name *
  • Title
  • Phone
  • What are your concerns?

      Sign up for our Newsletter!

      • Company *
      • First Name *
      • Last Name *

          Mobile? Grab this Article!

          QR-Code dieser Seite

          Tag Cloud

          security Tip of the Week technology Cloud Privacy Best Practices Productivity Hackers Business Computing business Microsoft Malware IT Services Internet Backup IT Support Hosted Solutions Managed Service Provider Email Network Workplace Tips Mobile Devices Communication Hardware Computer Smartphones Disaster Recovery Microsoft Office Windows Miscellaneous Mobile Device Management Efficiency Business Continuity Windows 10 Server Data Smartphone Holiday Small Business Software Alert Upgrade Saving Money Google Business Management Virtualization network security WiFi User Tips Passwords Remote Computing Ransomware Operating System VoIP Big Data Social Media Internet of Things BYOD Spam Innovation The Internet of Things Office Android Browser Vendor Management Apple Remote Monitoring Gmail Artificial Intelligence Mobile Computing Wireless Technology Apps App Budget IT Solutions Information Technology Outsourced IT Retail Best Practice Office Tips Save Money Tech Support Bring Your Own Device Going Green Collaboration Data Management Phishing Customer Service Automation Managed IT Services Business Growth Facebook Risk Management Analytics Hacker Customer Relationship Management virus Employer-Employee Relationship Robot IT Consultant Saving Time Computers Managed IT Health Document Management Gadgets Hosted Solution Outlook IT service Proactive IT Current Events Application Money Data storage Recovery Avoiding Downtime Presentation Hacking Content Filtering Firewall Hard Drives Lithium-ion Battery Running Cable Cost Management Search Marketing Humor Trending Education Network Congestion Analyitcs Safety End of Support Twitter Windows 8 Encryption Programming Cybersecurity User Disaster Website Wireless Settings Laptop Phone System USB Quick Tips VPN Chrome Virtual Desktop Administration Mobile Device PowerPoint Samsung Statistics Password Antivirus Save Time iPhone Office 365 Google Docs intranet communications Two-factor Authentication Cybercrime Hacks Work/Life Balance Tablet Net Neutrality Hiring/Firing Social Update Law Enforcement Downtime LiFi Business Owner Competition Cortana Maintenance Dark Data Gadget Buisness Refrigeration Router Debate Skype IT Management Deep Learning Consumers IP Address eWaste Knowledge Memory Software as a Service Google Wallet Politics CIO Touchscreen LinkedIn Public Cloud Google Calendar Mobile Office Environment Experience Technology Tips Drones Black Market Telephony User Error Best Available Access Control Identities security breach Troubleshooting History People Mobile Technology Mouse Training Undo Video Surveillance project management Solid State Drive Modern technology Specifications Display Word Mobile Payment Backups Processors File Sharing YouTube Licensing Mobility Data Breach Alt Codes business owners Monitors Online Currency Managed Service Providers Patch Management Legal Notifications Files Bandwidth Flexibility Domains Piracy Downloads Typing Wi-Fi bdr Writing Telephone Systems Websites IT Support Public Speaking Company Culture Business Intelligence Windows 8.1 Update Productivity data breaches Printer Cryptocurrency Help Desk Documents 5G Halloween Social Engineering Digital Signature Heating/Cooling Google Drive Crowdsourcing Botnet today ’s world IBM Crowdfunding risk Printer Server Bitcoin PDF Government Scary Stories Users experience downtime cyberattack Co-managed IT Augmented Reality Sports Compliance Excel Unified Communications Fun Travel cyberattacks Printing Storage Regulations Computer Repair Private Cloud Data loss Paperless Office Entrepreneur businesses Computing Data Backup How To GPS Error Personal Information Cleaning Emoji Cloud Computing Upgrades Tracking Electronic Medical Records Computer Care Cabling 3D Printing Identity Theft Automobile Staffing Infrastructure Unsupported Software Administrator test post Taxes Uninterrupted Power Supply Mobile Data Sync Web Server Hard Disk Drive Supercomputer Mobile Device Managment Cameras Comparison IT Budget CCTV Television Digital Payment Managed IT Services G Suite Virtual Reality Point of Sale Google Maps Machine Learning Corporate Profile Unified Threat Management SaaS Meetings Software Tips Relocation WannaCry Physical Security Webcam Motion Sickness Chromebook