Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Plus Artificial Intelligence Equals Big Trouble

Hackers Plus Artificial Intelligence Equals Big Trouble

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Upgrade Phishing Managed IT Services Windows Data Backup Outsourced IT Ransomware Windows 10 Server Save Money Cloud Computing Data Recovery Office Windows 10 Passwords Tech Term Chrome Virtualization Social Media Gadgets Saving Money Holiday Managed Service Microsoft Office Managed IT Services Automation Operating System Facebook Computers Artificial Intelligence Cybercrime IT Support Hacking Internet of Things BYOD Wi-Fi Health Mobile Device Management Networking Information Remote Spam Managed Service Provider Office 365 Telephone Systems Covid-19 Information Technology Alert Social Engineering Mobility Router BDR Recovery Employer-Employee Relationship Bandwidth Remote Monitoring Encryption Applications Big Data App History Law Enforcement Mobile Computing Application Human Resources Password Data Breach Money Mobile Office How To Government Office Tips Training Private Cloud VPN Data Storage Patch Management Managed IT Blockchain Apps Paperless Office Remote Computing HaaS Google Drive Infrastructure Data Security Voice over Internet Protocol Avoiding Downtime Wireless Flexibility Marketing Gmail WiFi IT solutions Settings Entertainment Website Vulnerability Budget Bring Your Own Device Windows 7 Data Management Word Two-factor Authentication Work/Life Balance Servers Mouse End of Support Connectivity Remote Work Education Physical Security User Error Safety Meetings HIPAA Sports Redundancy Vendor Keyboard Managed Services Risk Management Display Hacker The Internet of Things Data Protection Lithium-ion battery Employee/Employer Relationship RMM Save Time Conferencing Firewall USB Scam Cleaning Virtual Reality Apple Staff Software as a Service Telephone System Vendor Management Machine Learning Social Net Neutrality Unsupported Software Update Workplace Strategy Shadow IT Legal Charger Help Desk Printing Google Docs Internet Exlporer Compliance Identity Theft OneNote Computer Care Wearable Technology Retail Hard Drives Current Events PDF Managed Services Provider Telephony Instant Messaging Excel Samsung Robot Database Augmented Reality Proactive IT Biometrics Fraud Value Best Practice Virus Remote Workers Virtual Desktop Remote Worker YouTube Electronic Medical Records Black Market Unified Threat Management Processor Spam Blocking DDoS Cryptocurrency Computer Accessories Hiring/Firing SharePoint Hard Drive Document Management Wireless Technology Comparison Solid State Drive How to Downtime Printer Computing Customer Service CES Environment Bluetooth Data storage Content Management Business Intelligence Automobile Business Technology Fax Server Access Control Worker Audit Digital Signage IT Management Computing Infrastructure SaaS Virtual Assistant Going Green Authentication IT Consultant Botnet IT Plan Humor Network Congestion Battery eWaste Procurement Digital Signature Tablets Audiobook IBM Social Network Smart Technology Warranty Touchpad Investment Flash Entrepreneur Consultant Employees HVAC Employee/Employer Relationships Google Apps Shortcut Analysis ISP Software Tips Politics Supercomputer Advertising Windows 365 Analytics Administrator Video Conferencing Devices ROI Sync Cost Management Emails Shortcuts Best Available Sales Enterprise Content Management Notifications Bitcoin Social Networking Personal Accountants Cryptomining WIndows 7 Point of Sale MSP Two Factor Authentication Microchip Supply Chain Management Thought Leadership Credit Cards Netflix Root Cause Analysis Relocation Monitoring Running Cable Password Management Batteries Password Manager Digitize HBO Memory Multi-Factor Security Knowledge Windows 8.1 Music Search Engine Twitter Windows Server 2008 R2 Skype Video Games Data loss Worker Commute Customer relationships NIST Business Mangement PowerPoint IT Assessment Smart Tech Windows Media Player Manufacturing Outlook Trending Experience Leadership User Email Best Practices Troubleshooting Scalability Addiction Start Menu Amazon Security Cameras Screen Mirroring Science Business Owner Loyalty Computer Tips Managed IT Service Recycling NarrowBand OneDrive Practices Biometric Security Frequently Asked Questions Managing Stress Virtual CIO Books Wiring Search Peripheral Cache Mobile Amazon Web Services Windows 10s Cast iPhone Digital Security Cameras Distributed Denial of Service Safe Mode Cameras Using Data Customer Relationship Management Criminal Copiers Hosted Computing 5G Tip of the week Analyitcs webinar Emergency GDPR Employer Employee Relationship Quick Tip Wireless Internet Professional Services Programming Online Shopping Public Cloud Smartwatch Assessment Files Ergonomics File Sharing Camera Chromecast Development Inventory OLED Windows Server 2008 Specifications PCI DSS Antivirus Wire Virtual Machine Tools Evernote Employee Windows 8 Travel Television Colocation 2FA Uninterrupted Power Supply Printer Server Fiber Optics Printers Messaging IT service Cabling Millennials Monitor Policy Smart Office Hypervisor Wireless Charging Tablet Public Computer Dark mode Trend Micro Virtual Private Network SMS Domains Default App Regulations Workforce Transportation Computer Fan Rootkit Reputation Procedure Streaming Media Saving Time Cables Maintenance Google Search Content dark theme IaaS Tech Support Shopping Benefits Project Management Laptop AI Nanotechnology IT Infrastructure Bloatware Telecommuting Workers Techology FENG Customers FinTech Cortana Bing

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code