KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

In the Hands of Hackers Artificial Intelligence Can Be a Major Problem

In the Hands of Hackers Artificial Intelligence Can Be a Major Problem

As much as we personify the items in our life, we should remember that they are just that: items. However, technology has made it so that these items seem to be getting smarter through artificial intelligence. The first computer to play chess against a human opponent was introduced in 1956, and ever since, humanity has strived to make progress in the field of AI. In fact, AI is so valuable that even hackers are trying to take advantage of it.

At a recent technology expo, an experiment examined a competition between a human hacker and a sophisticated machine learning computer, where they both attempted to spear phish potential victims through Twitter. For two hours, a fierce battle waged where they attempted to outdo each other and craft the best phishing message. At about 1.075 tweets a minute, the human made 129 tweets, including 49 successful attempts. The computer made 810 tweets in the two hours, averaging about 6.75 tweets a minute and converting about 275 victims.

Humans might have achieved a higher victim-to-attempt percentage, but the machine managed to achieve five times as many victims in the same amount of time.

A Cylance poll held at ConFab asked attendees if hackers will use AI for meaningful purposes, and the answer might surprise you. 62 percent confirmed that they thought AI would be used by hackers on the offensive. Even if nobody could mention specific incidents, most believe that hackers have already attempted to use AI for their cybercrime. The unfortunate part of this is that AI is an ever-changing existence that has become a global problem. This makes it difficult to develop law enforcement strategies, as it’s difficult to find and prosecute perpetrators. Even if they can find them, it’s a case of whether or not there is legislation put into place to punish those who abuse this technology.

Worse yet, there are arguments among experts about what specifically defines artificial intelligence--especially with so many people using virtual assistants like Siri and Alexa. Some users might not classify these apps as AI, but they would be wrong.

Cybercriminals are always trying to use the most up-to-date technology, and AI is no exception. Hackers are using AI and machine learning to create programs that can personalize phishing emails containing malware attachments. In response to this threat, technology to distinguish real messages from the fake ones are developed. Cybersecurity is all about threats and hackers trying to outdo one another, which is why vulnerabilities are patched.

Would you consider using AI for your business? Let us know in the comments.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 23 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices hackers Technology Privacy Email malware Business Computing Network Security Cloud Internet Google software User Tips Backup Ransomware Business Efficiency Data Android IT Support Small Business Mobile Device Management Microsoft Computer IT Support Network Money Facebook Hardware Managed IT Services Phishing Smartphone Windows Hosted Solutions cybersecurity Mobile Devices VoIP Gmail Productivity Alert Artificial Intelligence Business Continuity communications Windows 10 Cloud Computing Data Management Internet of Things Data Security IT Management Operating System Microsoft Office Outsourced IT Encryption IT Services Hard Drive Cost Management Data storage Networking Bandwidth Upgrade Nextiva BDR security cameras Business Management Disaster Recovery Unified Communications Social Media Antivirus End of Support data breach vulnerability Office 365 Apple Update Passwords Managed IT Services Communication Robot Smartphones Outlook Save Money Automation Document Management SaaS Saving Money vulnerabilities Collaboration Information Technology Cryptocurrency IoT Holiday security solutions Server Remote Monitoring Hacking Google Wallet Social Engineering Big Data Google Docs Firewall Customer Service Legal The Internet of Things Apps Search Productivity IBM Google Maps Gadgets BYOD Scam Windows 10 Information Security Lunch and Learn Data Recovery Bitcoin WiFi Drones Start Menu History YouTube Politics Best Practice News Data Backup Digital Events App Access Control Data Protection Innovation Word Patch Management Event Marketing Law Enforcement Spam Local Buzz botnet South Dakota Browser Project Management Analytics Memory Event Maintenance Virtual Machines Telephony Local Technology Workers IT Assessment Solid State Drive Physical Security communication solutions SharePoint IoT Devices Law IT Managed Service Provider Business Growth Internet 101 Cache Tips and Tricks DDoS Hard Drive Disposal Virtualization security precautions identity theft Mixer Fortinet Network Congestion Risk Creep VoIP Sales Tax Samsung IT Strategy IT Security Deep Learning Lawyers Microsoft Office 365 Emergency Internet Connected Devices Dell ’s Sonicwall Global Management System email scam media experience Vendors Business Security IT for Oil Companies Tablets Administration Unified Threat Management Freedom of Information Cleaning Office Laptop IT Solutions eWaste Microsoft Office 365 features Business Technology Communications How To Password information Community Involvement Printing Risk Management Time Management Mobility Tablet Attorneys face Fake News Vendor Management Computing Infrastructure Disaster Phone System Flash Download Downloads Social Kaseya Unified Threat Management SOX Managed Services enterprise productivity software surveillance cameras Microsoft Excel Monitors Cortana Education Hosted Solution Hardware as a Service Content Filtering Settings healthcare Google Calendar Kaseya Connect Experience Sarbanes-Oxley Act Business Cards Computer Care Trend Micro Displays password manager LastPass AtomBombing Knowledge HaaS Managed IT Distributed Denial of Service Email Security tool Business Communications Workplace Tips Conference Business Comunications Sports End User Testing VPN Proactive IT Running Cable Press Release Chamber of Commerce Fast food Google Play Store Blockchain Wireless Technology user confidence Bluetooth appointment Tech Terms LiFi Quick Tips Uninterrupted Power Supply Vendor Mangement Comparison Office Tips Touchscreen Society Cybercrime Streaming Media Music Cabling Excel Safety Visible Light Communication Business Mangement Webcam Penetration Testing Specifications Websites Windows 8 Writing Windows XP Access botnet attack Government camera Tip of the week LastPass Microsoft Bookings Website Corporate Profile Compliance Phishing Scams Budget communication device Remote Computing Television Programming Software as a Service Tech Support Redundancy Black Market Worker Spyware Rebrand Virtual Reality macbook Virtual Assistant booking process Audit Advertising Cloud Backup Google Drive Hack File Sharing IT Consultation business owner Mouse Rapid City Virus Printer Retail Virtual Desktop Web Servers DDoS attacks Applications Mobile Device Banking Relocation Administrator Hacker 3D Printing base infrastructure CCTV Hacks Phone Systen Automobile Web Server security solution IT service Work/Life Balance Notifications Business Metrics Meetings end-of-support date Ordinary Computers CrashOverride holiday season Emails collaboration capabilities Chromebook Wi-Fi Rental Service Tracking Flexibility quantum computers UTM holidays Documents Supercomputer Threat management Reliable Computing Users scammers Text Messaging PDF Twitter IT Consultant Scalability network security professionals Computing Protection scams G Suite Training Computer Malfunction Travel Playbook Language Processors Employer-Employee Relationship Messenger Sync Employer Employee Relationship Digital Payment Private Cloud breach methods Miscellaneous Microchip Downtime Books In Internet of Things Motion Sickness Public Cloud Taxes Piracy Marketing Telephone Systems Reading Machine Learning Paperless Office Hiring/Firing Software License Health Bring Your Own Device