ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Artificial Intelligence Can Be Useful To Hackers, Too

Artificial Intelligence Can Be Useful To Hackers, Too

Man matching wits with computer isn’t new territory. In 1830, a locomotive raced a horse to see which was superior in terms of speed and distance. 1956 saw the first time a human played chess against a computer. Today, the time has come when an artificial intelligence has begun to break into a new territory that was dominated by humans for thousands of years: crime.

At a recent technology expo, a human hacker and a sophisticated computer that is capable of machine learning each attempted to spear-phish as many victims as possible through Twitter. For two hours, both entities refined their message in an effort to be more effective against the target. At approximately 1.075 tweets per minute, the human was able to make 129 tweets, 49 of which were successful. The computer was able to make 810 tweets in two hours, which is about 6.75 tweets per minute. In that time, 275 victims were converted.

Even though humans had a higher attempt-to-victim percentage, the machine was able to get 5 times as many victims in the same amount of time.

In a Cylance poll held during ConFab, attendees were asked if criminal hackers will use AI for offensive purposes in the coming year, to which 62 percent answered in the affirmative. Even though no one could cite any specific incidents, the overwhelming consensus among experts is that hackers have already begun using AI. Like all high-tech crimes, AI is a global issue that changes fast and often, making it extremely difficult for law enforcement to find and prosecute perpetrators. Even when they’re able to identify offenders, they often run into issues where the laws and statutes are well behind the technology in question.

Another reason that identifying and combatting AI is so difficult is because there are constant debates among experts around the globe on what exactly constitutes as AI. Think about it like this: millions of people consult virtual assistants, like Siri and Alexa, every day. However, if you ask the majority of them if they were using artificial intelligence, they’d say ‘No.’ In reality, they are both examples of AI being put to use to enhance the lives of its users.

There are a lot of potential uses for AI by cyber criminals. For example, hackers could use machine learning capabilities to write programs that personalize emails with malware attachments. As that technology is developed, there will likely be a time when distinguishing actual email and phishing attacks is nearly impossible. Another probable use of machine learning and AI for hacking is drastically reducing the time and resources it takes to find and exploit vulnerabilities in software though automation.

For a small business, AI might not be not something that you need to concern yourself with - and perhaps it isn't, at the moment. However, AI is already being incorporated into many aspects of business with great success and many experts feel it will be very important in the near future. What do you think? Would you be willing to give AI a try? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Google Hackers Privacy Cloud Backup Business Computing Microsoft Innovation Smartphones Hardware Small Business Email Data Backup Malware Data Business Cybercrime Software Ransomware Efficiency Internet Windows Mobile Devices Business Continuity Cybersecurity User Tips Android Managed IT Services Productivity Social Engineering How To VoIP Chrome Spam Collaboration Data Breach Managed IT Services Computer Computers Network Security Operating System Social Media Data Recovery Browser Communication Server App Automation Disaster Recovery Windows 10 Safety Bring Your Own Device Mobile Device Management Gadgets Law Enforcement Business Management Upgrade Outsourced IT Telephone Systems Smartphone Two-factor Authentication Data Security Artificial Intelligence Physical Security Downtime Private Cloud Google Drive Windows 10 Wi-Fi Redundancy Public Cloud Recovery Avoiding Downtime Quick Tips Office 365 Saving Money BDR Network Cloud Computing Internet Exlporer Data Storage Data storage Money Save Money Passwords IT Management Router Government Miscellaneous The Internet of Things Unsupported Software Bandwidth Hosted Solutions Phishing Spam Blocking Word Alert iPhone Voice over Internet Protocol Flexibility Black Market Windows Server 2008 Internet exploMicrosoft NarrowBand BYOD webinar Windows 10s Computer Care Managed IT Marketing Hacking Office Tips Managed Service Provider Meetings Networking Internet of Things Hiring/Firing Windows 7 Advertising Wireless Technology Conferencing Vulnerability Automobile Samsung Botnet Cleaning Sports IBM Multi-Factor Security Patch Management Flash HBO Emails Solid State Drive Work/Life Balance Value Travel Tech Support Health Data loss Supercomputer Trending Scam Robot Audit Microsoft Office Facebook Laptop Shadow IT Screen Mirroring Budget Comparison Apps Sync Hybrid Cloud Chromecast Computer Fan Communications Touchpad Files Cast Specifications Netflix FENG Remote Monitoring Office History Current Events Business Intelligence Telephony DDoS IT Support Update Relocation Outlook Knowledge Millennials Skype Gmail OneNote Humor Frequently Asked Questions User Error YouTube IT Plan Network Congestion Workforce Settings Start Menu Google Docs HaaS IT Services Productivity Excel Virtualization IT Consultant Telecommuting Tools Reputation Apple Root Cause Analysis Website Monitor Tip of the week End of Support Software Tips Remote Work Going Green Customer Uninterrupted Power Supply Books Save Time Data Management Worker Commute Risk Management Mobility Emergency Search Politics Legal How to Employer Employee Relationship Keyboard Best Practice Computer Accessories Webinar Loyalty VPN Experience Mobile Device Transportation Bluetooth IT solutions SaaS Remote Computing Music Video Games Benefits Battery PDF Scalability Firewall Education Worker Information Technology Thank You Content Assessment Password Wearable Technology Workplace Tips Smart Technology Computing Infrastructure Rootkit Congratulations Audiobook Television WiFi Techology USB Instant Messaging Two Factor Authentication Applications Training CrashOverride Entertainment Public Computer Troubleshooting Users Vendor Management Wireless Holiday IT Support Big Data Electronic Medical Records Virtual Reality Charger