(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Artificial Intelligence Can Be Useful To Hackers, Too

Artificial Intelligence Can Be Useful To Hackers, Too

Man matching wits with computer isn’t new territory. In 1830, a locomotive raced a horse to see which was superior in terms of speed and distance. 1956 saw the first time a human played chess against a computer. Today, the time has come when an artificial intelligence has begun to break into a new territory that was dominated by humans for thousands of years: crime.

At a recent technology expo, a human hacker and a sophisticated computer that is capable of machine learning each attempted to spear-phish as many victims as possible through Twitter. For two hours, both entities refined their message in an effort to be more effective against the target. At approximately 1.075 tweets per minute, the human was able to make 129 tweets, 49 of which were successful. The computer was able to make 810 tweets in two hours, which is about 6.75 tweets per minute. In that time, 275 victims were converted.

Even though humans had a higher attempt-to-victim percentage, the machine was able to get 5 times as many victims in the same amount of time.

In a Cylance poll held during ConFab, attendees were asked if criminal hackers will use AI for offensive purposes in the coming year, to which 62 percent answered in the affirmative. Even though no one could cite any specific incidents, the overwhelming consensus among experts is that hackers have already begun using AI. Like all high-tech crimes, AI is a global issue that changes fast and often, making it extremely difficult for law enforcement to find and prosecute perpetrators. Even when they’re able to identify offenders, they often run into issues where the laws and statutes are well behind the technology in question.

Another reason that identifying and combatting AI is so difficult is because there are constant debates among experts around the globe on what exactly constitutes as AI. Think about it like this: millions of people consult virtual assistants, like Siri and Alexa, every day. However, if you ask the majority of them if they were using artificial intelligence, they’d say ‘No.’ In reality, they are both examples of AI being put to use to enhance the lives of its users.

There are a lot of potential uses for AI by cyber criminals. For example, hackers could use machine learning capabilities to write programs that personalize emails with malware attachments. As that technology is developed, there will likely be a time when distinguishing actual email and phishing attacks is nearly impossible. Another probable use of machine learning and AI for hacking is drastically reducing the time and resources it takes to find and exploit vulnerabilities in software though automation.

For a small business, AI might not be not something that you need to concern yourself with - and perhaps it isn't, at the moment. However, AI is already being incorporated into many aspects of business with great success and many experts feel it will be very important in the near future. What do you think? Would you be willing to give AI a try? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 18 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Productivity Microsoft Backup Hosted Solutions Malware Internet Google Mobile Devices Efficiency VoIP IT Support Business Email Miscellaneous IT Services Managed Service Provider Innovation Server Workplace Tips Disaster Recovery Business Continuity Network Data Windows Upgrade Business Management Software Hardware Network Security Communication Computer Save Money Saving Money Mobile Device Management Virtualization Android Smartphones Microsoft Office User Tips communications Managed IT Services Holiday Browser Smartphone Data Backup Outsourced IT WiFi Windows 10 Computers Small Business BYOD Cybercrime Hacking Chrome Social Media Remote Monitoring Operating System Mobile Computing Alert Apple Proactive IT Big Data Avoiding Downtime Application Managed IT Services IT Solutions Social Engineering Data Recovery Office Quick Tips Budget Collaboration Employer-Employee Relationship Information Technology Passwords Marketing Automation Cloud Computing Ransomware The Internet of Things Telephone Systems BDR Mobility Health Gadgets Bring Your Own Device VPN spam Going Green Remote Computing Recovery Vendor Management App Gmail iPhone Cybersecurity Wireless Technology User Error Private Cloud How To Save Time Two-factor Authentication Firewall Managed IT Internet of Things Bandwidth Compliance Networking Lithium-ion battery Antivirus Vulnerability Analytics Router Data Security Mouse PowerPoint Website Redundancy Excel Phone System Content Filtering Money Office 365 Downtime Artificial Intelligence Data Management History Tablet Value IT Support Business Intelligence Retail Memory Search Office Tips Document Management Windows 10 Risk Management Online Currency Facebook People Business Owner Programming OneNote Network Congestion IT Plan Printer Trending Physical Security DDoS CES Robot Unsupported Software Work/Life Balance Google Drive Current Events Environment Humor Maintenance Human Resources Statistics SaaS Training Identity Theft Safety Government Public Cloud Outlook Credit Cards Meetings Phishing HaaS Intranet Flexibility Fax Server HIPAA Black Market Administration Data Storage Entertainment Internet Exlporer Running Cable Word Data storage Law Enforcement Unified Threat Management IT Consultant Biometrics Skype Solid State Drive Apps eWaste Mobile Office Customer Relationship Management Saving Time Hard Drives Workers Best Available IT Management NarrowBand Wireless Charging Servers Hosted Solution Customers Computing Infrastructure Criminal Cameras Social Networking Workforce Video Surveillance Legal Best Practice Chromecast Consultant Fiber-Optic Flash Education Software as a Service End of Support Analyitcs Printer Server Telecommuting Mobile Device Laptop Settings Print Server Cables Sync Piracy Update Internet exploMicrosoft Distributed Denial of Service Worker Commute Content Management Virtual Desktop Root Cause Analysis Remote Work Software Tips Touchpad User IT service Unified Communications Telephony Licensing Google Docs Patch Management Relocation Advertising Net Neutrality Computer Repair Blockchain Virtual Reality Data loss Samsung Uninterrupted Power Supply Domains Twitter Theft Start Menu Voice over Internet Protocol Scam Audit IaaS Staff Bloatware Cleaning Customer Service Charger Crowdfunding HBO Cortana Mobile Entrepreneur Multi-Factor Security Screen Mirroring Hybrid Cloud Touchscreen Tech Support Fraud Computer Care Frequently Asked Questions Google Apps Hacker Professional Services Cost Management Spam Blocking Lifestyle Cast Windows Media Player Shadow IT Amazon Tip of the week Tools Keyboard Wireless Infrastructure Science Instant Messaging Hiring/Firing Data Protection Streaming Media WIndows 7 Shortcut Amazon Web Services Windows Server 2008 SharePoint Password Manager Windows 8 Computer Fan Comparison Encryption Sports Managing Stress Online Shopping Bluetooth Windows 7 Applications Botnet Monitor Files Business Mangement Tablets Virus FENG Specifications Productivity LinkedIn Data Warehousing Password Notifications YouTube Evernote USB Regulations Wi-Fi Debate Travel Reputation Colocation Company Culture Wearable Technology Recycling Computer Accessories Windows 8.1 Update Social Millennials Electronic Medical Records Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Worker Content Supercomputer IT solutions Users Rootkit Video Games Audiobook Knowledge Netflix Scalability Politics Transportation Digital Signature How to webinar Benefits PDF Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology