Sunday, June 7, 03:48
Home security Artificial Intelligence: Can it be used for hacking purposes?

Artificial Intelligence: Can it be used for hacking purposes?

ArtificialWe are getting closer to the age when artificial intelligence will be the dominant one technology. This means that it is very likely that this technology will also be used hackers for data theft and other illegal activities.

According to Isaac Ben-Israel, director of the ICRC Blavatnik Interdisciplinary Cyber ​​Research Center in Tel Aviv, this is not something that will happen immediately but it will surely happen. For this reason, the experts security they have to think about how they will face future attacks.

Already, artificial intelligence is being used in more and more areas. According to Ben-Israel, what counts in addressing threats is not the level of technological development. The issue is the attitude that we have towards security and attacks.

“Many companies adopt the most sophisticated technology solutions to protect them from targeted and persistent attacks and other threats, using systems, based on artificial intelligence ”. This makes the companies feel confident about their safety and rest. In fact, however, when this happens, the attack by hackers is a given.

According to Ben-Israel, hackers are always one step ahead. Artificial intelligence can be used to detect new attack techniques through mechanical learning, but hackers can also use methods based on artificial intelligence to make suspicious behaviors normal.

Hackers can use mechanical learning to perform a range of illegal activities:

  • Collection of information - prepare for attack.
  • Delegation- trying to imitate a familiar person.
  • Unauthorized access - bypassing restrictions to gain access to user accounts and more.
  • Attack - performing a real attack, e.g. with malware, etc.
  • Automation - automation of the holding.

Through mechanical learning, all of this can be made even easier. The easiest procedures are to collect information and impersonation.

If a hacker wants to trick a user to open one malicious link, can use mechanical learning. Mechanical learning, combined with data from social media, can help the hacker choose the right target. To choose, for example, a worker who does not have much knowledge of technology to be an easier victim. Someone who never talks about technology but about other issues is more likely not to know much about security in Internet.

Various predictive, aggregation and classification methods can be used to identify the appropriate victims.

Ben-Israel believes that the solution to these future threats can be found if there are three things: knowledge-awareness, reinforcement of the field of artificial intelligence, greater attention to basic safety. Israel emphasizes that experts should not be confined to adopting technology solutions but should constantly monitor them, update them, and they should also be informed about the latest cyber security news.

Finally, as always, there is human element. Hackers often use a very effective technique, the social engineering. They use the emotional element of people. For this reason, it is necessary to train employees to identify suspicious emails, links, attachments, etc. Education is one of the most basic elements of cyber security.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement


Lyrics from AI technology or from people: Can you tell them apart?

While a large percentage of people can recognize when they are talking on a chatbot instead of a human operator, it seems that this is not the case ...

Technology and children: When are they ready for safe use?

Today's children and teens use various messaging apps and social media to ...

Call of Duty Black Ops Cold War: The first video leaked

The first video from the gameplay of Call of Duty 2020, which is rumored to be called Black Ops Cold War, has just been revealed.

Elon Musk: "It's time to break up Amazon"

Elon Musk intensifies the fight with Jeff Bezos with a new tweet: The General Manager of Tesla Inc., Elon Musk, said ...

Attack on America's 5G towers on Saturday!

Protests over 5G connectivity are scheduled to take place over the weekend, according to NATE. According to a recommendation that was identified ...

Windows 10 Updates: You can block them with Wu10Man!

Microsoft launched the Windows 10 update in May 2020, so it will be available on your computer soon ....

ECh0raix Ransomware: New campaign targets QNAP NAS devices!

Malicious agents behind eCh0raix Ransomware have launched a new campaign targeting QNAP NAS devices. ECh0raix was observed ...

Mac: How to change the storage location of your screenshots?

When you take screenshots on your Mac device using the Shift-Command-3 shortcut to take a screenshot of the entire computer screen or Shift-Command-4 ...

Malware USBCulprit: Aims devices that are not connected to a network

Did you think that devices without any connection to a local or other network (air-gapped devices) are safe? Think again! The USBCulprit malware that ...

Free Microsoft Teams: You can finally create meetings!

Users of the free version of Microsoft Teams can now create video meetings. The change, identified by ...