Artificial Intelligence May Give Hackers their Greatest Weapon Yet

Artificial Intelligence May Give Hackers their Greatest Weapon Yet

Artificial intelligence has been making waves in the world of cybersecurity, as machine learning could potentially make the solutions we have today smarter and better at their intended jobs. However, artificial intelligence has also appeared on the other side of cybersecurity, as cybercriminals have begun to leverage A.I. as well.

This only makes sense. After all, a computer can work a lot faster than a hacker can, with a lot less of a chance of human error. Hackers have discovered this, and have put A.I. to work deploying phishing attacks. A study conducted by the security firm ZeroFOX in 2016 found that an AI that they programed, called SNAP_R, was able to send simulated spear-phishing tweets at a rate of 6.75 per minute, successfully tripping up 275 victims out of 800 targeted users. On the other hand, a staff writer from Forbes who participated in the study could only produce these tweets at a rate of 1.075 each minute, only fooling 49 out of a total of 129 attempts.

More recently, a team from IBM was able to create programs that use machine learning to create programs capable of making it past some of the best defenses out there.

This only shows that we’ll soon see malware that is powered by A.I., assuming it isn’t out there already and it just hasn’t been discovered yet.

IBM’s project, nicknamed DeepLocker, was able to demonstrate how a hacked videoconferencing software was able to activate itself when a target’s face was detected in a photograph. The lead researcher for the IBM team, Marc Ph. Stoecklin, called this kind of attack the next big thing, going on to say, “This may have happened already, and we will see it two or three years from now.”

Other researchers have also demonstrated how A.I. can be leveraged in an attack, going so far as to only use open-source tools intended for training purposes to do it.

What do you think? Are there already artificially intelligent attacks being played out, or do you think the big reveal is yet to come? Let us know what you think in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, January 21 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Email Cloud Privacy Malware Network Security Hackers Business Computing Tech Term User Tips Business Google Software Computer Microsoft Internet IT Services Efficiency Productivity Hosted Solutions Ransomware Mobile Devices Communication Small Business IT Support Android Data Hardware Smartphone Managed IT Services Backup Saving Money Cloud Computing Browser Windows 10 Innovation Windows Internet of Things Data Management Data Recovery Managed IT Services Business Continuity Cybersecurity Productivity Microsoft Office Data Backup Workplace Tips Business Management App Disaster Recovery Encryption Office 365 Passwords Mobile Device Facebook Server Phishing Remote Monitoring Upgrade Gmail Artificial Intelligence Word Outsourced IT Windows 10 IT Support Money Employer-Employee Relationship Tip of the week Smartphones Applications BYOD Chrome Vulnerability Managed Service Provider Infrastructure Analytics communications Website Network Managed Service Big Data Government VoIP Antivirus Information Paperless Office Settings Router Google Drive Bandwidth Content Filtering Miscellaneous Users Company Culture Access Control YouTube IT Management Save Money Robot Social Media Risk Management Maintenance Automation Office Tips Data storage Employee-Employer Relationship Laptop HIPAA The Internet of Things Wireless Outlook Spam Computing SaaS Two-factor Authentication Mobile Security WiFi Avoiding Downtime Operating System Downtime Holiday Scam LiFi Hosted Solution Alert Administration Business Intelligence Networking Mouse Display Unified Threat Management VPN Data loss Telephone Systems Education Vendor Management Data Security Apple Monitors Server Management Storage desktop Business Technology Virtual Private Network Printing Managing Stress Touchscreen Firewall Quick Tips Tablet End of Support Development Hacker Virtual Reality Document Management Cost Management File Sharing Shortcut Distributed Denial of Service Mobile Device Management Identity Continuity Computer Care IBM VoIP Unified Threat Management Deep Learning Remote Computing Fraud Bluetooth Comparison Device Smart Office Solid State Drive Firefox Superfish Network Congestion Screen Reader Charging Alt Codes Licensing Dongle Address Permissions Wires Identity Theft LED Assessment Patch Management Managed IT Service Wi-Fi Solar Training Corporate Profile User Error PowerPoint Bring Your Own Device Writing Specifications Mobility Social Work Hard Disk Drive Customer Relationship Management Budget Cybercrime Computers Smart Tech Automobile Co-Managed IT Typing Marketing Humor Cooperation Service Level Agreement Dell Information Technology Dark Data Update Voice over Internet Protocol Heating/Cooling Multi-Factor Security Retail Hotspot Internet Exlporer Cabling Break Fix Current Events Compliance WannaCry Time Management Printer Onboarding Best Practice Gadgets Google Maps Search Black Friday Print Toner Politics IT Technicians Optimization Slack Connectivity Google Calendar Content Cryptocurrency Staff Leominster Emergency Apps Customer Service Modem FinTech Servers Google Docs Halloween Office Samsung Language Value Dark Web IT solutions Going Green Regulations Network Management Digital Signage Cyber Monday Shortcuts Hacks Tech Support Mirgation Recycling Monitoring IoT Legislation Streaming Bitcoin Augmented Reality K-12 Schools Google Wallet Chromebook Cookies MSP Digital Payment Business Growth Scary Stories Social Engineering Computing Infrastructure Professional Services Disaster Microsoft Excel Social Networking Digital SharePoint Troubleshooting Collaboration Managed IT Smart Technology Security Cameras Password Websites Chatbots eWaste Techology Spying Legal Running Cable Star Wars Statistics Human Error Windows 8 Buisness Wearable Technology Network upgrade How To Lenovo Analysis Unified Communications Drones Nanotechnology Sports Safety Alerts USB Uninterrupted Power Supply Mail Merge Blockchain Virtual Desktop Motherboard Cables Spyware Downloads Managed Services Personal Information Botnet 3D Printing Cortana Error Point of Sale Ben McDonald shares BDR Travel Mobile Computing Machine Learning Processors Unsupported Software G Suite Virtualization Regulation Supercomputer CrashOverride Motion Sickness Computer Repair Relocation Staffing Administrator Mobile Data Taxes How To Work/Life Balance Web Server what was your? Recovery IT Budget Health Private Cloud GPS IT Consultant Black Market Law Enforcement Cameras Notifications Meetings Electronic Medical Records Tracking Physical Security Cleaning Twitter Upgrades Gadget CCTV Emoji Crowdsourcing Webcam Printers

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3