(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Artificial Intelligence Can Be Useful To Hackers, Too

Man matching wits with computer isn’t new territory. In 1830, a locomotive raced a horse to see which was superior in terms of speed and distance. 1956 saw the first time a human played chess against a computer. Today, the time has come when an artificial intelligence has begun to break into a new territory that was dominated by humans for thousands of years: crime.

At a recent technology expo, a human hacker and a sophisticated computer that is capable of machine learning each attempted to spear-phish as many victims as possible through Twitter. For two hours, both entities refined their message in an effort to be more effective against the target. At approximately 1.075 tweets per minute, the human was able to make 129 tweets, 49 of which were successful. The computer was able to make 810 tweets in two hours, which is about 6.75 tweets per minute. In that time, 275 victims were converted.

Even though humans had a higher attempt-to-victim percentage, the machine was able to get 5 times as many victims in the same amount of time.

In a Cylance poll held during ConFab, attendees were asked if criminal hackers will use AI for offensive purposes in the coming year, to which 62 percent answered in the affirmative. Even though no one could cite any specific incidents, the overwhelming consensus among experts is that hackers have already begun using AI. Like all high-tech crimes, AI is a global issue that changes fast and often, making it extremely difficult for law enforcement to find and prosecute perpetrators. Even when they’re able to identify offenders, they often run into issues where the laws and statutes are well behind the technology in question.

Another reason that identifying and combatting AI is so difficult is because there are constant debates among experts around the globe on what exactly constitutes as AI. Think about it like this: millions of people consult virtual assistants, like Siri and Alexa, every day. However, if you ask the majority of them if they were using artificial intelligence, they’d say ‘No.’ In reality, they are both examples of AI being put to use to enhance the lives of its users.

There are a lot of potential uses for AI by cyber criminals. For example, hackers could use machine learning capabilities to write programs that personalize emails with malware attachments. As that technology is developed, there will likely be a time when distinguishing actual email and phishing attacks is nearly impossible. Another probable use of machine learning and AI for hacking is drastically reducing the time and resources it takes to find and exploit vulnerabilities in software though automation.

For a small business, AI might not be not something that you need to concern yourself with - and perhaps it isn't, at the moment. However, AI is already being incorporated into many aspects of business with great success and many experts feel it will be very important in the near future. What do you think? Would you be willing to give AI a try? Let us know in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 21 October 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Efficiency Mobile Devices Google IT Support Business Miscellaneous IT Services Managed Service Provider VoIP Server Workplace Tips Business Continuity Data Upgrade Disaster Recovery Innovation Network Hardware Email Software Windows Save Money Saving Money Business Management Computer Mobile Device Management Communication Microsoft Office Browser Network Security Virtualization Smartphones Android User Tips Windows 10 Smartphone WiFi Managed IT Services Operating System Hacking Holiday BYOD Social Media Cybercrime Chrome Mobile Computing Application IT Solutions communications Apple Proactive IT Computers Remote Monitoring Avoiding Downtime Passwords Big Data Marketing The Internet of Things Automation Outsourced IT Alert Quick Tips Small Business Office Information Technology Budget Mobility Health VPN Employer-Employee Relationship Managed IT Services Going Green Remote Computing Data Backup spam Ransomware Recovery Collaboration User Error Bring Your Own Device Save Time Firewall Cybersecurity Vendor Management iPhone Gadgets Managed IT Social Engineering App Wireless Technology Telephone Systems Gmail Lithium-ion battery IT Support Private Cloud PowerPoint Excel Phone System Mouse Downtime Redundancy History Tablet Office 365 Retail Antivirus Memory Search Bandwidth Compliance Networking Analytics Intranet Cloud Computing Law Enforcement Physical Security DDoS Humor BDR Robot Artificial Intelligence Solid State Drive Statistics Environment Google Drive Data Storage Outlook Word SaaS Website IT Consultant Windows 10 Safety Business Owner Content Filtering Money Government Flexibility Meetings Saving Time Administration Document Management HaaS Fax Server Risk Management Black Market Entertainment Online Currency Running Cable Data Management Value Skype Printer Internet of Things Unified Threat Management Internet Exlporer Unsupported Software Mobile Office Data storage Customer Relationship Management Biometrics Current Events Public Cloud Best Available Maintenance Phishing Vulnerability People How To Router Data Security Office Tips Programming Hard Drives Network Congestion Facebook Best Practice Screen Mirroring Social Networking Touchscreen Chromecast Frequently Asked Questions Worker Commute Piracy Analyitcs Professional Services User Cast Computer Fan Laptop Tip of the week Settings Applications Licensing Files Samsung Tools Distributed Denial of Service Virtual Desktop Twitter FENG Touchpad Windows Server 2008 IT service Human Resources Virtual Reality Colocation Crowdfunding Relocation Workers Uninterrupted Power Supply Business Intelligence Training Apps Windows 7 Domains Bloatware Computing Infrastructure Botnet IaaS Hosted Solution OneNote Cleaning Data Warehousing Customer Service Regulations Windows Media Player Entrepreneur Company Culture End of Support Travel Tech Support IT Management Windows 8.1 Update Servers Hacker Hiring/Firing Cost Management Internet exploMicrosoft Data Recovery WIndows 7 Root Cause Analysis Shadow IT IT Plan Two-factor Authentication Flash Wireless Science Patch Management Instant Messaging Advertising Software as a Service Streaming Media Managing Stress Data loss Shortcut LinkedIn Print Server Sync SharePoint Virus Windows 8 Update Encryption Sports Software Tips Bluetooth Debate Monitor Telephony eWaste Computer Accessories Tablets Notifications Net Neutrality Hybrid Cloud Computer Repair YouTube Computer Care USB Video Surveillance Reputation Start Menu Wearable Technology Cameras HIPAA Consultant Audit Social Trending Spam Blocking NarrowBand HBO Education Customers Mobile Printer Server Smart Technology Windows 10s Battery Experience Two Factor Authentication Assessment Music Productivity Password Television Wi-Fi Troubleshooting Electronic Medical Records Techology Public Computer Employer Employee Relationship Legal Data Breach Automobile Books Emails CrashOverride Mobile Device IBM Work/Life Balance Emergency Webinar Worker Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Scam Netflix Charger Scalability Politics Transportation Users Google Docs How to webinar Benefits PDF Loyalty Conferencing Keyboard