Account
Please wait, authorizing ...

Don't have an account? Register here today.

×

Analysis on malicious use of Artificial Intelligence

International. Watchguard shares below an interesting analysis of how hackers use technology in various phishing and social engineering strategies.

If we talk about Artificial Intelligence (AI) we can appreciate that the advances that are being achieved are increasingly surprising.

Through its implementation, companies can provide value to their services, automate complex tasks and improve day after day in their interaction with customers.

However, it should be noted that AI is a tool and as such the result of its application is based on use.

- Publicidad -

From the malicious use of AI new threats arise, some as harmless acts, others are criminal activities, such as systems that pretend to be human to bypass mechanisms or fake chatbots that request the entry of sensitive information.

Threats from AI-driven chatbots are considered one of the Information Security Industry Predictions that the WatchGuard research team developed based on the analysis of security and threat trends that occurred during 2018.

"Cyber criminals continue to modify the threat landscape as they update their tactics and intensify their attacks against businesses, governments, and even Internet infrastructure," said Corey Nachreiner, Chief Technology Officer, WatchGuard Technologies.

"In this scenario, SMEs continue to be the target of cybercriminals, so they must begin to review their current security measures and make the security of their networks a high priority, seeking to implement solutions through managed services companies," added the executive.

The actions of black hat hackers are implemented through malicious chat rooms on legitimate sites.

"The goal is to direct victims to access the malicious link and thereby download files containing malware or share private information, such as passwords, emails, credit card numbers or bank access codes," he explains.   

Through virtual assistants  or chatbots, hackers find new attack vectors.

- Publicidad -

A hacked chatbot could divert victims to malicious rather than legitimate links. Attackers could also take advantage of web application flaws on legitimate sites to insert a malicious chatbot.

"For example, a hacker might force the appearance of a fake chatbot while the victim is on a banking website, asking if they need help finding something. The chatbot could then recommend that the victim click on malicious links to fake banking resources instead of linking to the real ones. Those links could allow the attacker to do anything from installing malware to virtually hijacking the bank's site connection," Nachreiner explains.

To try to detect malicious chatbots, the Chief Technology Officer advises that it is important to ensure in all cases that the communication is encrypted, in addition to regulating the way in which the data of those chat sessions is managed or stored.

In summary, it is vitally important that those responsible for access and systems and computer security of organizations of all sizes implement not only the appropriate security measures; training employees in the actions of hackers and how to be vigilant to prevent them, should be part of a regular update activity to be aware of any suspicious activity.

Duván Chaverra Agudelo
Author: Duván Chaverra Agudelo
Jefe Editorial en Latin Press, Inc,.
Comunicador Social y Periodista con experiencia de más de 16 años en medios de comunicación. Apasionado por la tecnología y por esta industria. [email protected]

No thoughts on “Analysis on malicious use of Artificial Intelligence”

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
Suscribase Gratis
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS

Webinar: NxWitness el VMS rápido fácil y ultra ligero

Webinar: Por qué elegir productos con certificaciones de calidad

Por: Eduardo Cortés Coronado, Representante Comercial - SECO-LARM USA INC La importancia de utilizar productos certificados por varias normas internacionales como UL , Ul294, CE , Rosh , Noms, hacen a tus instalciones mas seguras y confiables además de ser un herramienta más de venta que garantice nuestro trabajo, conociendo qué es lo que certifica cada norma para así dormir tranquilos sabiendo que van a durar muchos años con muy bajo mantenimiento. https://www.ventasdeseguridad.com/2...

Webinar: Anviz ONE - Solución integral para pymes

Por: Rogelio Stelzer, Gerente comercial LATAM - Anviz Presentación de la nueva plataforma Anviz ONE, en donde se integran todas nuestras soluciones de control de acceso y asistencia, video seguridad, cerraduras inteligentes y otros sensores. En Anviz ONE el usuario podrá personalizar las opciones según su necesidad, de forma sencilla y desde cualquier sitio que tenga internet. https://www.ventasdeseguridad.com/2...

Webinar: Aplicaciones del IoT y digitalización en la industria logística

Se presentarán los siguientes temas: • Aplicaciones del IoT y digitalización en la industria logística. • Claves para decidir el socio en telecomunicaciones. • La última milla. • Nuevas estrategias de logística y seguimiento de activos sostenibles https://www.ventasdeseguridad.com/2...

Sesión 5: Milestone, Plataforma Abierta que Potencializa sus Instalaciones Manteniéndolas Protegidas

Genaro Sanchez, Channel Business Manager - MILESTONE https://www.ventasdeseguridad.com/2...
Load more...
SITE SPONSORS










LATEST NEWSLETTER
Latest Newsletter