Artificial Intelligence May Give Hackers their Greatest Weapon Yet

Artificial Intelligence May Give Hackers their Greatest Weapon Yet

Artificial intelligence has been making waves in the world of cybersecurity, as machine learning could potentially make the solutions we have today smarter and better at their intended jobs. However, artificial intelligence has also appeared on the other side of cybersecurity, as cybercriminals have begun to leverage A.I. as well.

This only makes sense. After all, a computer can work a lot faster than a hacker can, with a lot less of a chance of human error. Hackers have discovered this, and have put A.I. to work deploying phishing attacks. A study conducted by the security firm ZeroFOX in 2016 found that an AI that they programed, called SNAP_R, was able to send simulated spear-phishing tweets at a rate of 6.75 per minute, successfully tripping up 275 victims out of 800 targeted users. On the other hand, a staff writer from Forbes who participated in the study could only produce these tweets at a rate of 1.075 each minute, only fooling 49 out of a total of 129 attempts.

More recently, a team from IBM was able to create programs that use machine learning to create programs capable of making it past some of the best defenses out there.

This only shows that we’ll soon see malware that is powered by A.I., assuming it isn’t out there already and it just hasn’t been discovered yet.

IBM’s project, nicknamed DeepLocker, was able to demonstrate how a hacked videoconferencing software was able to activate itself when a target’s face was detected in a photograph. The lead researcher for the IBM team, Marc Ph. Stoecklin, called this kind of attack the next big thing, going on to say, “This may have happened already, and we will see it two or three years from now.”

Other researchers have also demonstrated how A.I. can be leveraged in an attack, going so far as to only use open-source tools intended for training purposes to do it.

What do you think? Are there already artificially intelligent attacks being played out, or do you think the big reveal is yet to come? Let us know what you think in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, November 18 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Email Privacy Malware Hackers Business Business Computing Software Network Security Computer Internet Microsoft IT Services Google Hosted Solutions Ransomware Tech Term Efficiency User Tips Mobile Devices Communication Android Managed IT Services Backup Smartphone Data Small Business Innovation Internet of Things Cloud Computing Productivity Saving Money Data Management Data Recovery Business Continuity Hardware IT Support Windows 10 Windows Browser Data Backup Cybersecurity App Managed IT Services Productivity Facebook Server Word Office 365 Workplace Tips Remote Monitoring Microsoft Office Upgrade Disaster Recovery Artificial Intelligence Encryption Gmail Business Management Passwords Chrome Money IT Support Managed Service Provider Outsourced IT Phishing Vulnerability Employer-Employee Relationship BYOD Website Applications Analytics communications Windows 10 Infrastructure Smartphones Network Tip of the week Maintenance Settings Antivirus Government YouTube Google Drive Content Filtering Bandwidth Risk Management Mobile Device Social Media Miscellaneous IT Management Office Tips Robot Save Money Big Data Company Culture Data storage Firewall Avoiding Downtime Virtual Reality Spam Computing Managing Stress Outlook Scam Operating System WiFi SaaS LiFi Development Hosted Solution Wireless Users Administration Managed Service Holiday Access Control HIPAA Mouse VPN Alert Data Security Display Server Management Information Business Technology Paperless Office Mobile Security Touchscreen Apple Virtual Private Network Education Storage Monitors Business Intelligence Laptop Vendor Management Data loss The Internet of Things Unified Threat Management Telephone Systems VoIP Automation desktop End of Support Two-factor Authentication Augmented Reality K-12 Schools Safety Patch Management Collaboration Managed IT Service Troubleshooting Cookies MSP Marketing User Error Computing Infrastructure Professional Services Remote Computing Specifications Spying Social Networking Gadgets Alt Codes Customer Relationship Management Network Congestion Heating/Cooling Multi-Factor Security Document Management Spyware Analysis Chatbots eWaste Bring Your Own Device Uninterrupted Power Supply Human Error Star Wars Printer Computer Care IBM Wearable Technology Network upgrade Budget File Sharing Break Fix Nanotechnology Social Time Management Alerts USB Information Technology Writing Search Black Friday Employee-Employer Relationship Motherboard Cables Halloween Typing Humor Wi-Fi Networking Solid State Drive Current Events Computers Servers Google Calendar Identity Theft Identity Continuity Best Practice Emergency Device Fraud Cost Management Dark Data Network Management Update Training Corporate Profile Smart Office Dark Web LED Screen Reader Charging Licensing Dongle Apps Retail Automobile Cyber Monday PowerPoint Wires Scary Stories Cryptocurrency Hard Disk Drive IT solutions Going Green Legislation Solar Running Cable Google Docs Politics Dell Assessment Customer Service SharePoint WannaCry Work Microsoft Excel Cabling Co-Managed IT Smart Tech Buisness Hacks Cooperation Service Level Agreement Virtual Desktop Google Wallet Office Managed IT Samsung Smart Technology Google Maps Onboarding Router Voice over Internet Protocol Sports Bitcoin Quick Tips Techology Printing Statistics Tablet Slack Compliance Business Growth How To Lenovo Tech Support Hotspot Internet Exlporer Chromebook Downloads IT Technicians Optimization Legal Mail Merge Blockchain Content Connectivity Password Staff Leominster Unified Communications Drones Social Engineering Shortcut Distributed Denial of Service Digital Signage Modem FinTech Windows 8 VoIP Unified Threat Management Bluetooth Comparison Digital Payment Monitoring Regulations Hacker Firefox Superfish Websites Language Value Digital Mirgation Recycling Cybercrime Deep Learning Address Permissions Disaster Streaming IoT Downtime Mobile Device Management Crowdsourcing Cleaning Personal Information CCTV Botnet Mobile Computing Cortana 3D Printing Webcam Printers Error Processors Machine Learning Virtualization Unsupported Software Point of Sale Ben McDonald shares Travel BDR Computer Repair G Suite Relocation Supercomputer CrashOverride Mobile Data Recovery Staffing How To Motion Sickness Work/Life Balance Regulation Administrator Health Taxes Private Cloud Black Market IT Budget Web Server what was your? GPS Law Enforcement Notifications Electronic Medical Records IT Consultant Twitter Physical Security Cameras Emoji Tracking Upgrades Meetings Gadget

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3