BNMC Blog

Artificial Intelligence May Give Hackers their Greatest Weapon Yet

Artificial Intelligence May Give Hackers their Greatest Weapon Yet

Artificial intelligence has been making waves in the world of cybersecurity, as machine learning could potentially make the solutions we have today smarter and better at their intended jobs. However, artificial intelligence has also appeared on the other side of cybersecurity, as cybercriminals have begun to leverage A.I. as well.

This only makes sense. After all, a computer can work a lot faster than a hacker can, with a lot less of a chance of human error. Hackers have discovered this, and have put A.I. to work deploying phishing attacks. A study conducted by the security firm ZeroFOX in 2016 found that an AI that they programed, called SNAP_R, was able to send simulated spear-phishing tweets at a rate of 6.75 per minute, successfully tripping up 275 victims out of 800 targeted users. On the other hand, a staff writer from Forbes who participated in the study could only produce these tweets at a rate of 1.075 each minute, only fooling 49 out of a total of 129 attempts.

More recently, a team from IBM was able to create programs that use machine learning to create programs capable of making it past some of the best defenses out there.

This only shows that we’ll soon see malware that is powered by A.I., assuming it isn’t out there already and it just hasn’t been discovered yet.

IBM’s project, nicknamed DeepLocker, was able to demonstrate how a hacked videoconferencing software was able to activate itself when a target’s face was detected in a photograph. The lead researcher for the IBM team, Marc Ph. Stoecklin, called this kind of attack the next big thing, going on to say, “This may have happened already, and we will see it two or three years from now.”

Other researchers have also demonstrated how A.I. can be leveraged in an attack, going so far as to only use open-source tools intended for training purposes to do it.

What do you think? Are there already artificially intelligent attacks being played out, or do you think the big reveal is yet to come? Let us know what you think in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, September 23 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Hackers Business Computing Network Security Microsoft Software Internet Google Tech Term Computer Hosted Solutions Ransomware Business IT Services Mobile Devices Backup Managed IT Services Smartphone User Tips Small Business Android Efficiency Data Recovery Saving Money Innovation IT Support Business Continuity Hardware Data Management Windows Internet of Things Cloud Computing Communication Browser App Windows 10 Data Backup Data Productivity Cybersecurity Business Management Managed IT Services Encryption Passwords Facebook Server Remote Monitoring Gmail Artificial Intelligence IT Support Office 365 Money Microsoft Office Windows 10 Infrastructure Disaster Recovery Tip of the week Smartphones Productivity Outsourced IT Word Analytics Chrome communications Managed Service Provider Applications Vulnerability Phishing Employer-Employee Relationship Network IT Management YouTube Risk Management Government Social Media Website Office Tips BYOD Google Drive Bandwidth Content Filtering Big Data Upgrade Maintenance Antivirus Settings Save Money Robot Data storage Mobile Device Data Security Business Technology Paperless Office Server Management Company Culture Outlook Touchscreen Spam Computing SaaS Virtual Private Network WiFi Holiday Managing Stress LiFi Unified Threat Management Hosted Solution Data loss Alert Telephone Systems Laptop Administration The Internet of Things desktop Mouse Miscellaneous Two-factor Authentication Avoiding Downtime Firewall HIPAA VoIP Scam Vendor Management Apple Monitors Mobile Security Storage Automation Wireless Workplace Tips Business Intelligence End of Support Virtual Reality Information VPN Remote Computing Automobile Staff Leominster Hard Disk Drive Cyber Monday Modem FinTech Deep Learning Language Value Dell Legislation Regulations Network Congestion Onboarding IoT Alt Codes Cabling SharePoint Mirgation Recycling Scary Stories Slack WannaCry Microsoft Excel Bring Your Own Device Operating System Writing Quick Tips Google Maps Techology Augmented Reality K-12 Schools Running Cable Wi-Fi Managed IT Smart Technology Cookies MSP How To Lenovo Computing Infrastructure Professional Services Social Statistics Tablet Social Networking Buisness Budget Computers Digital Signage Star Wars Virtual Desktop Typing Humor Downloads Chatbots eWaste Sports Information Technology Dark Data Monitoring Mail Merge Blockchain Best Practice Retail VoIP Unified Threat Management Wearable Technology Network upgrade Current Events Shortcut Distributed Denial of Service Nanotechnology Development Troubleshooting Firefox Digital Payment Superfish Alerts USB Politics Bluetooth Comparison Motherboard Cables Display Fraud Cost Management Cryptocurrency Disaster Identity Continuity Apps Customer Service Spying Address Digital Permissions Google Docs Office Samsung Collaboration User Error Smart Office IT solutions Going Green Analysis Patch Management Managed IT Service Screen Reader Charging Customer Relationship Management Licensing Dongle Cybercrime Education Hacks Tech Support Specifications Wires Downtime Spyware Assessment Bitcoin Heating/Cooling Uninterrupted Power Supply Multi-Factor Security Marketing Solar Google Wallet Chromebook Employee-Employer Relationship Document Management Business Growth Social Engineering File Sharing Time Management Printer Gadgets Work Printing Managed Service Computer Care IBM Break Fix Smart Tech Networking Cooperation Service Level Agreement Password Websites Search Solid State Drive Black Friday Router Voice over Internet Protocol Legal Identity Theft Emergency Hotspot Internet Exlporer Windows 8 Servers Google Calendar Compliance Unified Communications Drones PowerPoint Connectivity Hacker Safety Network Management Access Control IT Technicians Users Optimization Halloween Training Corporate Profile Dark Web Mobile Device Management Personal Information Botnet G Suite Supercomputer CrashOverride 3D Printing Cortana Motion Sickness Staffing Processors Administrator Mobile Computing Machine Learning Taxes IT Budget Unsupported Software Web Server what was your? Virtualization Update GPS Computer Repair Relocation IT Consultant Mobile Data Cameras How To Work/Life Balance Meetings Recovery Tracking Health Private Cloud Cleaning Black Market Printers CCTV BDR Law Enforcement Webcam Regulation Notifications Electronic Medical Records Twitter Error Physical Security Upgrades Gadget Point of Sale Ben McDonald shares Emoji Crowdsourcing Travel

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3