ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

In the Hands of Hackers Artificial Intelligence Can Be a Major Problem

In the Hands of Hackers Artificial Intelligence Can Be a Major Problem

As much as we personify the items in our life, we should remember that they are just that: items. However, technology has made it so that these items seem to be getting smarter through artificial intelligence. The first computer to play chess against a human opponent was introduced in 1956, and ever since, humanity has strived to make progress in the field of AI. In fact, AI is so valuable that even hackers are trying to take advantage of it.

At a recent technology expo, an experiment examined a competition between a human hacker and a sophisticated machine learning computer, where they both attempted to spear phish potential victims through Twitter. For two hours, a fierce battle waged where they attempted to outdo each other and craft the best phishing message. At about 1.075 tweets a minute, the human made 129 tweets, including 49 successful attempts. The computer made 810 tweets in the two hours, averaging about 6.75 tweets a minute and converting about 275 victims.

Humans might have achieved a higher victim-to-attempt percentage, but the machine managed to achieve five times as many victims in the same amount of time.

A Cylance poll held at ConFab asked attendees if hackers will use AI for meaningful purposes, and the answer might surprise you. 62 percent confirmed that they thought AI would be used by hackers on the offensive. Even if nobody could mention specific incidents, most believe that hackers have already attempted to use AI for their cybercrime. The unfortunate part of this is that AI is an ever-changing existence that has become a global problem. This makes it difficult to develop law enforcement strategies, as it’s difficult to find and prosecute perpetrators. Even if they can find them, it’s a case of whether or not there is legislation put into place to punish those who abuse this technology.

Worse yet, there are arguments among experts about what specifically defines artificial intelligence--especially with so many people using virtual assistants like Siri and Alexa. Some users might not classify these apps as AI, but they would be wrong.

Cybercriminals are always trying to use the most up-to-date technology, and AI is no exception. Hackers are using AI and machine learning to create programs that can personalize phishing emails containing malware attachments. In response to this threat, technology to distinguish real messages from the fake ones are developed. Cybersecurity is all about threats and hackers trying to outdo one another, which is why vulnerabilities are patched.

Would you consider using AI for your business? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Data Backup Ransomware communications Smartphone Small Business Upgrade Microsoft Office Smartphones Network Mobile Devices Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media Users VoIP Mobile Device Automation Tech Term Facebook Windows 10 Business Continuity Passwords Holiday Disaster Recovery Covid-19 IT Support Browser Managed Service Windows 10 Apps Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Data Management Internet of Things Remote Work Saving Money Operating System Government Networking Windows Artificial Intelligence Gadgets Managed IT services Workplace Strategy Mobile Device Management WiFi App Server Virtualization Information Spam Bandwidth Business Technology Remote Blockchain Encryption Gmail Office Apple Two-factor Authentication Information Technology Office 365 History Budget Employee/Employer Relationship Conferencing Big Data Access Control Data Security BDR Health Cybercrime Wi-Fi Analytics Remote Computing Help Desk Hacking Cost Management Voice over Internet Protocol Patch Management Vendor Document Management Hacker Remote Monitoring Save Money Employer-Employee Relationship IT Management Compliance Training IBM Outlook Data loss Website Computing Password Vendor Management Hard Drive Mobile Office Managed Services Legal Applications Project Management Search... Data storage Vulnerabilities Money Best Practice Customer Service Unified Threat Management Retail Firewall Alert Augmented Reality Word Hiring/Firing BYOD Windows 11 VPN Router Chrome Update The Internet of Things Remote Workers YouTube Twitter Data Breach Windows 7 Law Enforcement Mobile Computing Free Resource Paperless Office Laptop End of Support Antivirus Printer Marketing How To Maintenance Running Cable Monitoring Storage Social Healthcare Sports Travel SaaS Websites DDoS Virtual Reality Social Engineering Meetings Cryptocurrency Mobility Black Market iPhone Cleaning Education Cortana Google Maps Scam Robot User Content Filtering Video Conferencing Excel Virtual Machines Solid State Drive Processors Computer Repair Tech Terms Professional Services Managed IT Chromebook Drones Virtual Assistant Digital Automobile PowerPoint Managed Services Provider Taxes Administration How To Wireless Technology Microchip Presentation Virtual Private Network eWaste Processor Flexibility Specifications IT Consultant Current Events Physical Security Downtime Hack Safety Identity Theft Customer Relationship Management Solutions Notifications Co-Managed IT Unified Communications Entertainment Virtual Desktop Images 101 Multi-factor Authentication Integration Experience Start Menu Google Docs Display Bluetooth Computer Care Downloads Distributed Denial of Service Vulnerability Saving Time Office Tips Employees Memory Private Cloud Software as a Service Avoiding Downtime Bitcoin Disaster Data Protection Computers Holidays Telephone HIPAA Politics Settings Lithium-ion battery Cooperation Machine Learning LiFi 2FA Social Network Banking Entrepreneur Google Wallet Teamwork Hypervisor Knowledge Data Analysis Documents Messenger Business Owner Data Storage Corporate Profile Screen Reader Application Deep Learning Shopping Telephony Trends Employer Employee Relationship Mobile Technology Business Intelligence Medical IT Television Security Cameras Paperless Customer Resource management Business Metrics Cabling Devices Hosted Solution SQL Server Licensing G Suite Tip of the week Fileless Malware Securty Books PCI DSS Tablet Gig Economy VoIP Gamification Domains Language Humor Tracking Company Culture Society Supply Chain Mouse Business Communications Telephone System Internet Service Provider Regulations Azure Managed IT Service Web Server Visible Light Communication Directions Reading Inbound Marketing Regulations Compliance Backup and Disaster Recovery Monitors Content Memes Digital Payment Desktop Windows 8 Workplace SharePoint Human Resources Electronic Medical Records Net Neutrality Worker Accountants Advertising Relocation Financial Data Access Database Public Speaking Displays Electronic Payment Risk Management Time Management Work/Life Balance IT Public Cloud Tech Support Scams Streaming Media Google Apps Health IT Equifax Keyboard Hard Drive Disposal Audit Telework Spyware Tactics Hard Drives Smartwatch Username Phone System Communitications File Sharing intranet Microsoft 365 Cables In Internet of Things Redundancy Wireless Hacks Procurement Startup Shortcut Network Congestion Freedom of Information email scam Environment Navigation Reliable Computing FinTech Cache Addiction Heating/Cooling Writing Windows XP CES Unified Threat Management IT Assessment Workers Mobile Security Social Networking Point of Sale User Tip Supply Chain Management Legislation Value News Computer Accessories Cyber security CCTV Shortcuts Printing Evernote Scalability Organization Network Management Administrator Touchscreen Text Messaging Smart Devices Proactive IT Emergency Proxy Server Bring Your Own Device Remote Working Emails Computer Malfunction Fake News AI Vendor Mangement Service Level Agreement Trend Micro Computing Infrastructure Be Proactive Digital Security Cameras Management Electronic Health Records Samsung Device security Music Transportation Wasting Time Webcam Microsoft Excel Staffing Uninterrupted Power Supply Wireless Headphones Business Mangement Going Green IP Address eCommerce Business Cards Modem Workplace Strategies Tech Botnet Videos Error Surveillance Tablets Managing Costs Bookmark Rental Service Troubleshooting Micrsooft Download Flash Supercomputer Piracy SSID Google Calendar Term Media Virus Telephone Systems Development HTML Business Growth Employer/Employee Relationships Virtual Machine Motion Sickness Browsers Recovery Nanotechnology Competition Reviews Google Drive Upload Optimization Software License Smart Technology Comparison Google Play

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?