(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Artificial Intelligence Can Be Useful To Hackers, Too

Artificial Intelligence Can Be Useful To Hackers, Too

Man matching wits with computer isn’t new territory. In 1830, a locomotive raced a horse to see which was superior in terms of speed and distance. 1956 saw the first time a human played chess against a computer. Today, the time has come when an artificial intelligence has begun to break into a new territory that was dominated by humans for thousands of years: crime.

At a recent technology expo, a human hacker and a sophisticated computer that is capable of machine learning each attempted to spear-phish as many victims as possible through Twitter. For two hours, both entities refined their message in an effort to be more effective against the target. At approximately 1.075 tweets per minute, the human was able to make 129 tweets, 49 of which were successful. The computer was able to make 810 tweets in two hours, which is about 6.75 tweets per minute. In that time, 275 victims were converted.

Even though humans had a higher attempt-to-victim percentage, the machine was able to get 5 times as many victims in the same amount of time.

In a Cylance poll held during ConFab, attendees were asked if criminal hackers will use AI for offensive purposes in the coming year, to which 62 percent answered in the affirmative. Even though no one could cite any specific incidents, the overwhelming consensus among experts is that hackers have already begun using AI. Like all high-tech crimes, AI is a global issue that changes fast and often, making it extremely difficult for law enforcement to find and prosecute perpetrators. Even when they’re able to identify offenders, they often run into issues where the laws and statutes are well behind the technology in question.

Another reason that identifying and combatting AI is so difficult is because there are constant debates among experts around the globe on what exactly constitutes as AI. Think about it like this: millions of people consult virtual assistants, like Siri and Alexa, every day. However, if you ask the majority of them if they were using artificial intelligence, they’d say ‘No.’ In reality, they are both examples of AI being put to use to enhance the lives of its users.

There are a lot of potential uses for AI by cyber criminals. For example, hackers could use machine learning capabilities to write programs that personalize emails with malware attachments. As that technology is developed, there will likely be a time when distinguishing actual email and phishing attacks is nearly impossible. Another probable use of machine learning and AI for hacking is drastically reducing the time and resources it takes to find and exploit vulnerabilities in software though automation.

For a small business, AI might not be not something that you need to concern yourself with - and perhaps it isn't, at the moment. However, AI is already being incorporated into many aspects of business with great success and many experts feel it will be very important in the near future. What do you think? Would you be willing to give AI a try? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, June 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Microsoft Hosted Solutions Productivity Internet Malware Backup Google Mobile Devices Efficiency VoIP IT Support Business IT Services Network Security Email Managed Service Provider Miscellaneous Server Data Workplace Tips Innovation Network Upgrade Disaster Recovery Business Continuity Software Windows Business Management Managed IT Services Computer Saving Money Hardware Communication Virtualization Android Save Money Smartphone Browser Mobile Device Management Smartphones User Tips Data Backup communications Cybercrime Holiday Outsourced IT Microsoft Office WiFi Internet of Things Windows 10 BYOD Computers Cloud Computing Social Media Remote Monitoring Hacking Chrome Big Data Operating System Ransomware Mobile Computing Data Recovery Small Business Collaboration Proactive IT VPN Avoiding Downtime Managed IT Services Application IT Solutions Automation Alert Apple Budget Information Technology Passwords Tech Term Marketing Social Engineering The Internet of Things BDR Employer-Employee Relationship Quick Tips Office Health Mobility Bring Your Own Device Artificial Intelligence Recovery Going Green spam Remote Computing Cybersecurity Telephone Systems Bandwidth Gadgets Managed IT Wireless Technology Router User Error IT Support Office 365 Two-factor Authentication Data Protection Business Intelligence Website Money Save Time Firewall App Gmail Document Management Vendor Management Private Cloud Compliance How To Vulnerability Data Security iPhone Redundancy Analytics Law Enforcement Data Management Productivity Word PowerPoint Windows 10 Connectivity Excel Phone System Office Tips Content Filtering Downtime Apps Facebook History Entertainment Tablet Lithium-ion battery Value Risk Management Memory Retail Search Phishing Antivirus Identity Theft Mouse Networking HaaS Education Fax Server Black Market Solid State Drive Applications Humor Infrastructure Statistics Streaming Media Analysis Intranet Data Storage Internet Exlporer Workers Data storage Encryption Biometrics Comparison Windows 7 Sports Business Owner Outlook eWaste OneNote YouTube Flexibility USB Hard Drives Mobile Device IT Consultant IT Management Servers Work/Life Balance Administration Smart Tech IT Plan Saving Time Running Cable CES Physical Security DDoS Unsupported Software Unified Threat Management Robot Data loss Skype Online Currency Mobile Office Environment Content Management Update Google Drive Public Cloud Customer Relationship Management Printer Human Resources SaaS Training Best Available People Safety HIPAA Current Events Programming Government Cleaning Network Congestion Credit Cards Trending Maintenance Meetings Entrepreneur Digital Signature Net Neutrality Multi-Factor Security Computer Repair Screen Mirroring Frequently Asked Questions Tech Support Printer Server Access Control Fraud Wireless Internet Hacker Google Apps Professional Services Worker Commute Cost Management Strategy Piracy Computer Fan Lifestyle Cast Tip of the week Shadow IT Authentication Amazon Wire Science Tools User Wireless Files Password Instant Messaging Touchscreen Licensing FENG Samsung Windows Server 2008 Wi-Fi Shortcut Nanotechnology Amazon Web Services Smart Office Twitter Windows 8 Password Manager SharePoint Colocation Accountants Electronic Medical Records Crowdfunding Bluetooth Online Shopping Paperless Office Tablets Business Mangement Botnet Monitor Hosted Solution Computing Infrastructure Notifications Legal Specifications Data Warehousing Regulations Devices Evernote Students Recycling Travel Reputation Wearable Technology End of Support Windows Media Player Social IoT Millennials Healthcare NarrowBand Wireless Charging Criminal Customers Internet exploMicrosoft Best Practice Social Networking Hiring/Firing Root Cause Analysis Workforce Thought Leadership Fiber-Optic Electronic Health Records Flash Chromecast WIndows 7 Analyitcs Company Culture Software as a Service Patch Management Advertising Insurance Telecommuting Content Filter Windows 8.1 Update Cables Machine Learning Sync Laptop Managing Stress Settings Scam Distributed Denial of Service Charger Software Tips Virus Virtual Desktop Practices Remote Work Storage LinkedIn Unified Communications HVAC Telephony Touchpad IT service Hybrid Cloud Virtual Reality Blockchain Debate Google Docs Relocation Computer Care Uninterrupted Power Supply Computer Accessories Hosted Computing Addiction Theft Start Menu Print Server Domains IaaS PDF Bloatware Staff Spam Blocking Voice over Internet Protocol Audit Video Surveillance HBO Cameras Customer Service Inventory Cache Cortana Mobile Keyboard Consultant Windows 10s Smart Technology Users Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing