ct logo wslogan

3 minutes reading time (507 words)

Artificial Intelligence Can Be Useful To Hackers, Too

Artificial Intelligence Can Be Useful To Hackers, Too

Man matching wits with computer isn’t new territory. In 1830, a locomotive raced a horse to see which was superior in terms of speed and distance. 1956 saw the first time a human played chess against a computer. Today, the time has come when an artificial intelligence has begun to break into a new territory that was dominated by humans for thousands of years: crime.

At a recent technology expo, a human hacker and a sophisticated computer that is capable of machine learning each attempted to spear-phish as many victims as possible through Twitter. For two hours, both entities refined their message in an effort to be more effective against the target. At approximately 1.075 tweets per minute, the human was able to make 129 tweets, 49 of which were successful. The computer was able to make 810 tweets in two hours, which is about 6.75 tweets per minute. In that time, 275 victims were converted.

Even though humans had a higher attempt-to-victim percentage, the machine was able to get 5 times as many victims in the same amount of time.

In a Cylance poll held during ConFab, attendees were asked if criminal hackers will use AI for offensive purposes in the coming year, to which 62 percent answered in the affirmative. Even though no one could cite any specific incidents, the overwhelming consensus among experts is that hackers have already begun using AI. Like all high-tech crimes, AI is a global issue that changes fast and often, making it extremely difficult for law enforcement to find and prosecute perpetrators. Even when they’re able to identify offenders, they often run into issues where the laws and statutes are well behind the technology in question.

Another reason that identifying and combatting AI is so difficult is because there are constant debates among experts around the globe on what exactly constitutes as AI. Think about it like this: millions of people consult virtual assistants, like Siri and Alexa, every day. However, if you ask the majority of them if they were using artificial intelligence, they’d say ‘No.’ In reality, they are both examples of AI being put to use to enhance the lives of its users.

There are a lot of potential uses for AI by cyber criminals. For example, hackers could use machine learning capabilities to write programs that personalize emails with malware attachments. As that technology is developed, there will likely be a time when distinguishing actual email and phishing attacks is nearly impossible. Another probable use of machine learning and AI for hacking is drastically reducing the time and resources it takes to find and exploit vulnerabilities in software though automation.

For a small business, AI might not be not something that you need to concern yourself with - and perhaps it isn't, at the moment. However, AI is already being incorporated into many aspects of business with great success and many experts feel it will be very important in the near future. What do you think? Would you be willing to give AI a try? Let us know in the comments!



Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Cloud Business Computing Hackers Backup Microsoft Malware Innovation Internet Email Tech Term Mobile Devices Data Network Security Cybercrime Small Business VoIP Android Business Data Backup Software Efficiency Ransomware Smartphones Hardware Cloud Computing Windows User Tips Smartphone Internet of Things Computers Business Management How To Cybersecurity Browser Communication Automation Business Continuity Money Artificial Intelligence Router Productivity Mobile Device Management Managed IT Services Law Enforcement Social Engineering Hosted Solutions Chrome Network Communications Upgrade Data Recovery Computer Collaboration Managed IT Services Bring Your Own Device Data Protection Windows 10 Vulnerability Data Security Two-factor Authentication Safety Gadgets Connectivity Bandwidth Operating System Saving Money Social Media Telephone Systems Server Phishing BDR Alert Office 365 Data Breach Spam Outsourced IT Disaster Recovery App Word Save Money Sports Networking IT Support Gmail Data storage Remote Monitoring Identity Theft Managed IT YouTube Physical Security IT Management Business Intelligence Password Windows 10 Paperless Office Private Cloud OneNote Update Recovery Government Windows 7 Downtime Infrastructure Virtualization The Internet of Things Google Drive IT Plan VPN Public Cloud CES Facebook Unsupported Software Applications Productivity Wi-Fi Microsoft Office Miscellaneous IT Services Content Management Redundancy Internet Exlporer Quick Tips Avoiding Downtime Comparison Apps Spam Blocking Website Blockchain BYOD Passwords Data Storage Cleaning Online Shopping Practices Meetings Voice over Internet Protocol HIPAA Managed Service Provider Document Management Advertising Safe Mode eWaste Relocation Conferencing Addiction Windows Server 2008 Hiring/Firing Samsung HVAC Workers Knowledge Smart Tech Tech Support Telephony Evernote IBM Hosted Computing Human Resources Patch Management Outlook Digital Signature Virtual Assistant Workplace Tips Criminal USB Emails Cache Credit Cards Automobile Value User Error Solid State Drive Enterprise Content Management Botnet Legal Network Congestion HBO Millennials Shadow IT Skype Wireless Charging Supercomputer Inventory Data loss Multi-Factor Security Staff Scam Health Settings Machine Learning Humor Encryption Telephone System Chromecast Wireless Internet Flash Fraud Work/Life Balance Robot Audit Password Management Travel Password Manager Keyboard IT Consultant Devices Frequently Asked Questions Workforce Start Menu HaaS Cortana Entertainment Reputation Budget Access Control Screen Mirroring Trending Uninterrupted Power Supply Going Green Amazon Accountants Hybrid Cloud Root Cause Analysis Google Docs Big Data Laptop Apple Wire End of Support Computer Fan NIST Mobile Device Business Mangement Data Management NarrowBand Thought Leadership Software Tips Excel Telecommuting Electronic Medical Records Tools Google Apps Holiday Customer Authentication Cast Office Tips Charger Files Sync Amazon Web Services Monitor PDF DDoS Touchpad iPhone Netflix Smart Office Internet exploMicrosoft FENG Cryptocurrency Recycling Wireless Technology Office webinar Tip of the week Remote Work History Windows 10s Servers Flexibility Employer-Employee Relationship Hacking Current Events Nanotechnology Marketing Specifications Black Market Computer Care Information Technology Emergency Worker Congratulations Assessment Scalability Wearable Technology Worker Commute Mobility Risk Management Education Smart Technology Content Search Rootkit Television Employer Employee Relationship Politics Computing Infrastructure Two Factor Authentication Techology Audiobook How to Training Computer Accessories Public Computer CrashOverride WiFi Instant Messaging Troubleshooting Webinar Loyalty Best Practice Remote Computing Wireless Transportation Vendor Management Company Culture Bluetooth IT solutions SaaS Experience Users IT Support Benefits Managing Stress Books Thank You Video Games Music Twitter Virtual Reality Save Time Battery Firewall