ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Artificial Intelligence Can Be Useful To Hackers, Too

Artificial Intelligence Can Be Useful To Hackers, Too

Man matching wits with computer isn’t new territory. In 1830, a locomotive raced a horse to see which was superior in terms of speed and distance. 1956 saw the first time a human played chess against a computer. Today, the time has come when an artificial intelligence has begun to break into a new territory that was dominated by humans for thousands of years: crime.

At a recent technology expo, a human hacker and a sophisticated computer that is capable of machine learning each attempted to spear-phish as many victims as possible through Twitter. For two hours, both entities refined their message in an effort to be more effective against the target. At approximately 1.075 tweets per minute, the human was able to make 129 tweets, 49 of which were successful. The computer was able to make 810 tweets in two hours, which is about 6.75 tweets per minute. In that time, 275 victims were converted.

Even though humans had a higher attempt-to-victim percentage, the machine was able to get 5 times as many victims in the same amount of time.

In a Cylance poll held during ConFab, attendees were asked if criminal hackers will use AI for offensive purposes in the coming year, to which 62 percent answered in the affirmative. Even though no one could cite any specific incidents, the overwhelming consensus among experts is that hackers have already begun using AI. Like all high-tech crimes, AI is a global issue that changes fast and often, making it extremely difficult for law enforcement to find and prosecute perpetrators. Even when they’re able to identify offenders, they often run into issues where the laws and statutes are well behind the technology in question.

Another reason that identifying and combatting AI is so difficult is because there are constant debates among experts around the globe on what exactly constitutes as AI. Think about it like this: millions of people consult virtual assistants, like Siri and Alexa, every day. However, if you ask the majority of them if they were using artificial intelligence, they’d say ‘No.’ In reality, they are both examples of AI being put to use to enhance the lives of its users.

There are a lot of potential uses for AI by cyber criminals. For example, hackers could use machine learning capabilities to write programs that personalize emails with malware attachments. As that technology is developed, there will likely be a time when distinguishing actual email and phishing attacks is nearly impossible. Another probable use of machine learning and AI for hacking is drastically reducing the time and resources it takes to find and exploit vulnerabilities in software though automation.

For a small business, AI might not be not something that you need to concern yourself with - and perhaps it isn't, at the moment. However, AI is already being incorporated into many aspects of business with great success and many experts feel it will be very important in the near future. What do you think? Would you be willing to give AI a try? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Hackers Cloud Backup Google Microsoft Business Computing Privacy Innovation Hardware Efficiency Small Business Malware Data Cybercrime Ransomware Software Email Internet Mobile Devices Business Continuity Smartphones Cybersecurity Android Business Managed IT Services Productivity Gadgets Business Management Law Enforcement Upgrade VoIP How To Chrome Spam Data Breach Computer Windows Computers Data Backup Network Security Operating System Social Media Browser Server Automation User Tips App Safety Mobile Device Management Miscellaneous The Internet of Things Social Engineering Unsupported Software Hosted Solutions Bandwidth Phishing Redundancy Telephone Systems Alert Smartphone Spam Blocking Avoiding Downtime Collaboration Data Security Downtime Communication Physical Security Private Cloud Windows 10 Recovery Google Drive Public Cloud Quick Tips Saving Money Network Office 365 Internet Exlporer Data storage Disaster Recovery Data Storage Passwords Word Save Money Windows 10 Bring Your Own Device Money Government User Error IT Plan Network Congestion Windows 7 Virtualization Settings Botnet HaaS IT Services IT Consultant Flash Productivity Monitor Reputation Travel Apple Root Cause Analysis Going Green Uninterrupted Power Supply Outsourced IT End of Support Software Tips Black Market Customer NarrowBand iPhone Office Tips Flexibility Managed IT Services Internet exploMicrosoft BYOD Internet of Things webinar Sync Computer Care Marketing Hacking Windows 10s Data Recovery Wireless Technology Managed Service Provider Meetings Networking Cleaning Advertising Conferencing Sports Hiring/Firing Samsung Automobile Artificial Intelligence Vulnerability Remote Monitoring IBM Tech Support Patch Management HBO Robot Emails Telephony Value Solid State Drive Update Health Data loss Laptop Supercomputer Shadow IT Wi-Fi Skype Chromecast Microsoft Office Facebook Audit Screen Mirroring Touchpad Budget Frequently Asked Questions Hybrid Cloud Start Menu Computer Fan Files Cast BDR Excel Netflix Tools FENG Cloud Computing DDoS Office History Current Events Tip of the week Outlook IT Support Relocation IT Management Knowledge Windows Server 2008 Gmail Router Humor Managed IT YouTube OneNote Two Factor Authentication Instant Messaging Training Applications CrashOverride Public Computer Entertainment Troubleshooting Vendor Management Users Wireless Holiday Big Data IT Support Electronic Medical Records Charger Data Management Virtual Reality Books Save Time Worker Commute Risk Management Emergency Mobility Search Politics Legal How to Employer Employee Relationship Work/Life Balance Keyboard Scam Best Practice Webinar VPN Computer Accessories WiFi Loyalty Experience Transportation Mobile Device Apps IT solutions Remote Computing Bluetooth Google Docs SaaS Communications Music Benefits Video Games Battery PDF Website Firewall Thank You Scalability Worker Education Information Technology Assessment Content Wearable Technology Password Smart Technology Congratulations Workplace Tips Rootkit Computing Infrastructure Television Audiobook USB Techology