ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Artificial Intelligence Can Be Useful To Hackers, Too

Artificial Intelligence Can Be Useful To Hackers, Too

Man matching wits with computer isn’t new territory. In 1830, a locomotive raced a horse to see which was superior in terms of speed and distance. 1956 saw the first time a human played chess against a computer. Today, the time has come when an artificial intelligence has begun to break into a new territory that was dominated by humans for thousands of years: crime.

At a recent technology expo, a human hacker and a sophisticated computer that is capable of machine learning each attempted to spear-phish as many victims as possible through Twitter. For two hours, both entities refined their message in an effort to be more effective against the target. At approximately 1.075 tweets per minute, the human was able to make 129 tweets, 49 of which were successful. The computer was able to make 810 tweets in two hours, which is about 6.75 tweets per minute. In that time, 275 victims were converted.

Even though humans had a higher attempt-to-victim percentage, the machine was able to get 5 times as many victims in the same amount of time.

In a Cylance poll held during ConFab, attendees were asked if criminal hackers will use AI for offensive purposes in the coming year, to which 62 percent answered in the affirmative. Even though no one could cite any specific incidents, the overwhelming consensus among experts is that hackers have already begun using AI. Like all high-tech crimes, AI is a global issue that changes fast and often, making it extremely difficult for law enforcement to find and prosecute perpetrators. Even when they’re able to identify offenders, they often run into issues where the laws and statutes are well behind the technology in question.

Another reason that identifying and combatting AI is so difficult is because there are constant debates among experts around the globe on what exactly constitutes as AI. Think about it like this: millions of people consult virtual assistants, like Siri and Alexa, every day. However, if you ask the majority of them if they were using artificial intelligence, they’d say ‘No.’ In reality, they are both examples of AI being put to use to enhance the lives of its users.

There are a lot of potential uses for AI by cyber criminals. For example, hackers could use machine learning capabilities to write programs that personalize emails with malware attachments. As that technology is developed, there will likely be a time when distinguishing actual email and phishing attacks is nearly impossible. Another probable use of machine learning and AI for hacking is drastically reducing the time and resources it takes to find and exploit vulnerabilities in software though automation.

For a small business, AI might not be not something that you need to concern yourself with - and perhaps it isn't, at the moment. However, AI is already being incorporated into many aspects of business with great success and many experts feel it will be very important in the near future. What do you think? Would you be willing to give AI a try? Let us know in the comments!



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Hackers Business Computing Microsoft Cloud Backup Innovation Small Business Email Hardware Android Business Cybercrime Efficiency Smartphones Malware Software Network Security Ransomware How To VoIP Data Backup Windows Mobile Devices Data Cybersecurity Cloud Computing Browser Managed IT Services Computers Mobile Device Management Productivity Chrome Business Management User Tips Internet Business Continuity Social Engineering Outsourced IT Alert Collaboration Server Managed IT Services Automation Windows 10 Disaster Recovery Safety Two-factor Authentication Bring Your Own Device Gadgets Operating System Social Media Phishing Upgrade Spam Data Breach Telephone Systems Data Recovery Smartphone App Data Security Communication Internet of Things Vulnerability Computer Money Law Enforcement Saving Money Data Storage Network Internet Exlporer Word Data storage IT Management Passwords Artificial Intelligence Save Money Physical Security OneNote IT Plan Private Cloud Gmail Google Drive Unsupported Software Wi-Fi Public Cloud Virtualization Miscellaneous The Internet of Things Data Protection Redundancy Apps Spam Blocking Avoiding Downtime Hosted Solutions Comparison Office 365 Communications Bandwidth BYOD Remote Monitoring Business Intelligence Downtime Router Update Government Windows 10 CES Recovery Quick Tips VPN BDR Touchpad End of Support Google Apps Netflix Tools Blockchain Customer FENG Website iPhone Remote Work Current Events Tip of the week Flexibility Internet exploMicrosoft Employer-Employee Relationship IT Support Marketing HIPAA Hacking Voice over Internet Protocol Managed Service Provider DDoS Identity Theft Knowledge Windows Server 2008 Advertising Workers Managed IT Automobile Outlook Human Resources Credit Cards Network Congestion Windows 7 Legal Infrastructure Settings Botnet Multi-Factor Security Work/Life Balance Humor YouTube Staff Health Fraud IT Consultant Flash Keyboard Productivity Password Manager Travel Root Cause Analysis Trending Microsoft Office Big Data Facebook Software Tips Amazon Electronic Medical Records Charger Hybrid Cloud Business Mangement Monitor Digital Signature Going Green Files Uninterrupted Power Supply Amazon Web Services webinar Sync Computer Care Black Market PDF Recycling Windows 10s Meetings Data Management Specifications Networking NarrowBand Encryption Office History Office Tips Online Shopping Conferencing Hiring/Firing Samsung eWaste IBM Patch Management Password Wireless Technology Accountants Relocation HBO Cleaning Evernote Emails Telephony Value Sports Criminal Solid State Drive Data loss Millennials Supercomputer Scam User Error Tech Support Wireless Charging Skype Robot Audit Screen Mirroring Workforce Budget Frequently Asked Questions HaaS Laptop Shadow IT Cortana Start Menu IT Services Content Management Reputation Computer Fan Google Docs Cast Telecommuting Excel Holiday Chromecast Apple Virtual Reality Remote Computing Firewall Worker Assessment Worker Commute Wearable Technology Risk Management Smart Technology Mobility Search Thank You Rootkit Television USB Politics Two Factor Authentication How to Congratulations Training CrashOverride Public Computer Troubleshooting Best Practice Vendor Management Experience Mobile Device Books Music Save Time Video Games Battery Emergency Scalability Education Information Technology Content Employer Employee Relationship Workplace Tips Computing Infrastructure Audiobook Techology Webinar Computer Accessories Instant Messaging Loyalty Applications WiFi Entertainment Transportation IT solutions Bluetooth SaaS Users Wireless Benefits IT Support