(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Artificial Intelligence Can Be Useful To Hackers, Too

Man matching wits with computer isn’t new territory. In 1830, a locomotive raced a horse to see which was superior in terms of speed and distance. 1956 saw the first time a human played chess against a computer. Today, the time has come when an artificial intelligence has begun to break into a new territory that was dominated by humans for thousands of years: crime.

At a recent technology expo, a human hacker and a sophisticated computer that is capable of machine learning each attempted to spear-phish as many victims as possible through Twitter. For two hours, both entities refined their message in an effort to be more effective against the target. At approximately 1.075 tweets per minute, the human was able to make 129 tweets, 49 of which were successful. The computer was able to make 810 tweets in two hours, which is about 6.75 tweets per minute. In that time, 275 victims were converted.

Even though humans had a higher attempt-to-victim percentage, the machine was able to get 5 times as many victims in the same amount of time.

In a Cylance poll held during ConFab, attendees were asked if criminal hackers will use AI for offensive purposes in the coming year, to which 62 percent answered in the affirmative. Even though no one could cite any specific incidents, the overwhelming consensus among experts is that hackers have already begun using AI. Like all high-tech crimes, AI is a global issue that changes fast and often, making it extremely difficult for law enforcement to find and prosecute perpetrators. Even when they’re able to identify offenders, they often run into issues where the laws and statutes are well behind the technology in question.

Another reason that identifying and combatting AI is so difficult is because there are constant debates among experts around the globe on what exactly constitutes as AI. Think about it like this: millions of people consult virtual assistants, like Siri and Alexa, every day. However, if you ask the majority of them if they were using artificial intelligence, they’d say ‘No.’ In reality, they are both examples of AI being put to use to enhance the lives of its users.

There are a lot of potential uses for AI by cyber criminals. For example, hackers could use machine learning capabilities to write programs that personalize emails with malware attachments. As that technology is developed, there will likely be a time when distinguishing actual email and phishing attacks is nearly impossible. Another probable use of machine learning and AI for hacking is drastically reducing the time and resources it takes to find and exploit vulnerabilities in software though automation.

For a small business, AI might not be not something that you need to concern yourself with - and perhaps it isn't, at the moment. However, AI is already being incorporated into many aspects of business with great success and many experts feel it will be very important in the near future. What do you think? Would you be willing to give AI a try? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 13 December 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Efficiency Mobile Devices IT Support Business VoIP Miscellaneous IT Services Managed Service Provider Server Disaster Recovery Business Continuity Workplace Tips Network Data Upgrade Innovation Email Software Windows Hardware Computer Save Money Saving Money Business Management Communication Smartphones Mobile Device Management Virtualization User Tips Network Security Browser Microsoft Office Managed IT Services WiFi Android Windows 10 Holiday Smartphone Hacking Chrome Social Media Data Backup Operating System Mobile Computing Outsourced IT BYOD communications Proactive IT Remote Monitoring Avoiding Downtime Application IT Solutions Small Business Computers Apple Cybercrime Information Technology Big Data Ransomware Passwords Social Engineering Marketing Automation The Internet of Things Alert Office Quick Tips Budget Collaboration Recovery spam Going Green Remote Computing Employer-Employee Relationship Mobility Health Bring Your Own Device VPN Managed IT Services Save Time Cybersecurity Firewall Telephone Systems App Data Recovery Vendor Management Managed IT iPhone Wireless Technology Gadgets User Error PowerPoint Windows 10 Website Excel Phone System Office Tips Content Filtering Artificial Intelligence Downtime History Tablet Gmail Lithium-ion battery BDR Retail Memory Search Private Cloud Bandwidth Compliance How To Networking Mouse Antivirus Redundancy Cloud Computing Office 365 IT Support Two-factor Authentication Router Analytics Data Storage Internet Exlporer Data storage Word Business Intelligence Biometrics Outlook Intranet Business Owner Flexibility Money Hard Drives IT Management Facebook Administration Work/Life Balance Entertainment Apps Running Cable IT Consultant Physical Security DDoS Value Skype Unsupported Software Unified Threat Management Robot Google Drive Public Cloud Mobile Office Environment Saving Time Customer Relationship Management Document Management Risk Management Phishing Vulnerability SaaS Online Currency Best Available Data Security People Safety Printer Government Programming Network Congestion Meetings Trending HaaS Fax Server Current Events Black Market Law Enforcement Maintenance Data Management Solid State Drive Humor Internet of Things Statistics Licensing FENG Data Protection Productivity Streaming Media Instant Messaging Shortcut Samsung Windows Server 2008 Wi-Fi SharePoint Colocation Twitter Windows 8 Workers Comparison Encryption Bluetooth Touchscreen Crowdfunding Windows 7 Sports Monitor Hosted Solution eWaste Computing Infrastructure Tablets Botnet OneNote Specifications Data Warehousing Notifications USB Regulations YouTube Reputation Wearable Technology End of Support Travel Millennials Windows Media Player Social Servers NarrowBand Customers Internet exploMicrosoft Hiring/Firing Root Cause Analysis Workforce IT Plan Best Practice Social Networking WIndows 7 Flash Chromecast Patch Management Advertising Analyitcs Software as a Service Data loss Managing Stress Settings Sync Laptop Scam Distributed Denial of Service Update Company Culture LinkedIn Software Tips Virus Virtual Desktop IT service Human Resources Windows 8.1 Update Telephony Touchpad Google Docs Relocation Hybrid Cloud Virtual Reality Debate Computer Care Uninterrupted Power Supply Computer Accessories Training Domains Start Menu HIPAA Spam Blocking Voice over Internet Protocol Audit IaaS Bloatware Video Surveillance HBO Cleaning Cameras Customer Service Consultant Mobile Multi-Factor Security Print Server Screen Mirroring Entrepreneur Education Printer Server Frequently Asked Questions Tech Support Hacker Professional Services Piracy Computer Fan Lifestyle Cast Worker Commute Cost Management Net Neutrality Computer Repair Tip of the week Shadow IT Applications User Wireless Files Science Tools Password Television Troubleshooting Electronic Medical Records Techology Public Computer Employer Employee Relationship Legal Data Breach Automobile Books Emails CrashOverride Mobile Device IBM Emergency Webinar Worker Supercomputer Content IT solutions Telecommuting Rootkit Video Games Knowledge Audiobook Netflix Remote Work Charger Scalability Politics Transportation How to webinar Benefits PDF Loyalty Keyboard Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Users Music