KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

In the Hands of Hackers Artificial Intelligence Can Be a Major Problem

In the Hands of Hackers Artificial Intelligence Can Be a Major Problem

As much as we personify the items in our life, we should remember that they are just that: items. However, technology has made it so that these items seem to be getting smarter through artificial intelligence. The first computer to play chess against a human opponent was introduced in 1956, and ever since, humanity has strived to make progress in the field of AI. In fact, AI is so valuable that even hackers are trying to take advantage of it.

At a recent technology expo, an experiment examined a competition between a human hacker and a sophisticated machine learning computer, where they both attempted to spear phish potential victims through Twitter. For two hours, a fierce battle waged where they attempted to outdo each other and craft the best phishing message. At about 1.075 tweets a minute, the human made 129 tweets, including 49 successful attempts. The computer made 810 tweets in the two hours, averaging about 6.75 tweets a minute and converting about 275 victims.

Humans might have achieved a higher victim-to-attempt percentage, but the machine managed to achieve five times as many victims in the same amount of time.

A Cylance poll held at ConFab asked attendees if hackers will use AI for meaningful purposes, and the answer might surprise you. 62 percent confirmed that they thought AI would be used by hackers on the offensive. Even if nobody could mention specific incidents, most believe that hackers have already attempted to use AI for their cybercrime. The unfortunate part of this is that AI is an ever-changing existence that has become a global problem. This makes it difficult to develop law enforcement strategies, as it’s difficult to find and prosecute perpetrators. Even if they can find them, it’s a case of whether or not there is legislation put into place to punish those who abuse this technology.

Worse yet, there are arguments among experts about what specifically defines artificial intelligence--especially with so many people using virtual assistants like Siri and Alexa. Some users might not classify these apps as AI, but they would be wrong.

Cybercriminals are always trying to use the most up-to-date technology, and AI is no exception. Hackers are using AI and machine learning to create programs that can personalize phishing emails containing malware attachments. In response to this threat, technology to distinguish real messages from the fake ones are developed. Cybersecurity is all about threats and hackers trying to outdo one another, which is why vulnerabilities are patched.

Would you consider using AI for your business? Let us know in the comments.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 20 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology hackers Email Business Computing Cloud Internet malware Google Network Security software Efficiency Ransomware User Tips Backup Data Business Microsoft Computer IT Support Android Managed IT Services Small Business Smartphone Productivity Windows VoIP Hosted Solutions IT Support Network Mobile Device Management IT Management Operating System Business Continuity Money Mobile Devices Facebook Hardware Artificial Intelligence Windows 10 cybersecurity Cloud Computing communications Data Management Passwords Upgrade Communication Outsourced IT security cameras Business Management Disaster Recovery Encryption Alert data breach End of Support Apple Phishing Bandwidth Nextiva BDR Smartphones Microsoft Office Outlook IT Services Unified Communications Social Media Antivirus Internet of Things Data storage Update Gmail Google Wallet Local Buzz Google Docs Firewall Legal Spam Productivity South Dakota Analytics Browser Drones Save Money SaaS Saving Money IoT Document Management Information Technology History Server Politics Remote Monitoring App vulnerability Networking Customer Service Innovation Search Big Data IBM Law Enforcement The Internet of Things Managed IT Services Google Maps Robot Apps Scam BYOD Lunch and Learn Data Recovery Start Menu Windows 10 WiFi Automation YouTube Hard Drive Events Data Backup Access Control Best Practice Word security solutions Patch Management Event Marketing Data Security How To Corporate Profile Password Microsoft Office 365 features Windows XP Phishing Scams information Community Involvement Programming Windows 8 Software as a Service Redundancy Worker Website Spyware face Rebrand Vendor Management Audit Cloud Backup Google Drive Compliance File Sharing IT Consultation Flash Download Rapid City Tech Support Virus Project Management Web Servers Advertising enterprise productivity software surveillance cameras Applications Monitors Hosted Solution Maintenance Content Filtering Virtual Machines Telephony Local Technology Workers Virtual Desktop IT Assessment Settings healthcare Physical Security IoT Devices Printer Law IT Managed Service Provider Internet 101 Cache Trend Micro Tips and Tricks Displays Collaboration Fortinet Managed IT Risk Creep VoIP password manager LastPass AtomBombing Sales Tax Samsung IT Strategy tool Workplace Tips Lawyers Emergency Fast food Google Play Store Internet Connected Devices Proactive IT Quick Tips Business Security IT for Oil Companies Cryptocurrency user confidence Bluetooth appointment Tablets Administration Office Tips Laptop IT Solutions Business Technology Communications Music Printing Risk Management Cleaning Time Management Mobility Safety Office 365 Webcam Tablet Hacking Attorneys Disaster botnet attack Phone System Government camera Writing Downloads Kaseya Unified Threat Management LastPass Microsoft Bookings communication device Remote Computing SOX Managed Services Budget botnet Social Hardware as a Service Virtual Reality macbook Black Market Gadgets Google Calendar Hack Kaseya Connect Information Security booking process Education business owner Computer Care Sarbanes-Oxley Act Knowledge DDoS attacks HaaS Experience Retail Business Communications Conference Business Comunications Email Security Memory Event Running Cable Press Release communication solutions Chamber of Commerce End User Testing VPN Solid State Drive Tech Terms Uninterrupted Power Supply Vendor Mangement vulnerabilities DDoS Sports Business Growth Network Congestion Comparison News Wireless Technology Touchscreen Virtualization security precautions identity theft Mixer Cabling LiFi Digital Cost Management Deep Learning Data Protection Business Mangement Dell ’s Sonicwall Global Management System Microsoft Office 365 media experience Vendors Specifications Society Websites Streaming Media Penetration Testing Visible Light Communication Access Office Social Engineering Business Metrics Public Cloud Taxes Television end-of-support date holiday season Wi-Fi Rental Service collaboration capabilities Chromebook Paperless Office Marketing Mouse UTM Flexibility holidays Documents Cortana Threat management Reliable Computing scammers Text Messaging PDF Twitter Computing CCTV Distributed Denial of Service Scalability scams Phone Systen Web Server G Suite IT service Language Processors Computer Malfunction Travel Employer-Employee Relationship Meetings Ordinary Computers Sync Messenger CrashOverride Miscellaneous Microchip Emails Private Cloud quantum computers In Internet of Things Books Tracking Motion Sickness Supercomputer Telephone Systems Reading Hiring/Firing Machine Learning Health Bring Your Own Device IT Consultant network security professionals Users Administrator Banking Relocation Hacker Training 3D Printing Playbook base infrastructure Hacks Automobile Holiday Employer Employee Relationship breach methods security solution Digital Payment Unified Threat Management Work/Life Balance Notifications