By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data-driven white label SEO
    Does Data Mining Really Help with White Label SEO?
    7 Min Read
    marketing analytics for hardware vendors
    IT Hardware Startups Turn to Data Analytics for Market Research
    9 Min Read
    big data and digital signage
    The Power of Big Data and Analytics in Digital Signage
    5 Min Read
    data analytics investing
    Data Analytics Boosts ROI of Investment Trusts
    9 Min Read
    football data collection and analytics
    Unleashing Victory: How Data Collection Is Revolutionizing Football Performance Analysis!
    4 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-23 SmartData Collective. All Rights Reserved.
Reading: Will Hackers Eventually Use Big Data and AI Against Us?
Share
Notification Show More
Aa
SmartData CollectiveSmartData Collective
Aa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Business Intelligence > Artificial Intelligence > Will Hackers Eventually Use Big Data and AI Against Us?
Artificial IntelligenceBig DataExclusiveITSecurity

Will Hackers Eventually Use Big Data and AI Against Us?

Bill Hess
Last updated: 2018/02/08 at 8:30 PM
Bill Hess
6 Min Read
AI and big data
Shutterstock Licensed Photo - By Panchenko Vladimir
SHARE

As our technology develops into the future, the chance that hackers might deliver an enormous destructive blow to the public is growing along that curve. It could be self-organized and independent hacker groups, nation-organized hacker groups or even cyberterrorists. That being said, the threat is real.

Contents
Complex Hacks are Made Easier Thanks to AIData Integrity HacksInternational Incidents and Machine LearningSo, what can you do to protect yourself?1) Unique Passwords2) Change Passwords3) Two-factor Authentication

There are numerous movies showing examples of what hackers are capable of with big data hacks and what the impact of such an attack means. For example, switching off all electricity in a city, launching missiles at civilians, police stations or another army base. Hackers might be able to take control of important systems and do whatever they please for a certain amount of time.

Complex Hacks are Made Easier Thanks to AI

However, security experts have mentioned that such massively impactful hacks are not caused by a few simple tweaks in a system or a minor breach in the security defenses. Although, hackers could deploy an AI to slowly penetrate the system over time and transition slowly to a situation in which they have full control. The strategy would be to create minor changes that appear to happen naturally in order to avoid detection.

When it comes to big data, hackers could damage or tweak big data sets with relatively small adjustments in order to benefit from that. It could be, in some ways, harmless to the public but hackers could exploit yearly financial business reports for a personal advantage. Such changes in financial reporting models could also change the decision-making of CEO’s, traders, bankers and other people who base their decisions on these financial reports.

More Read

data security unveiled

Data Security Unveiled: Protecting Your Information in a Connected World

NIST 800-171 Safeguards Help Non-Federal Networks Handling CUI
Empowering Parents With Big Data: Ensuring Child Safety And Development
Security In Automated Document Processing: Ensuring Data Integrity And Confidentiality
Unleashing Victory: How Data Collection Is Revolutionizing Football Performance Analysis!

Data Integrity Hacks

A variant on these big data hacks is data-integrity hacks. The largest data breach ever discovered was reported not too long ago. Yahoo confirmed two major breaches in their database in September and December of 2016, however, the breach occurred way earlier than reported. Yahoo confirmed that these two data breaches took place in August 2013 and late 2014. All of their 3 billion users were affected by this attack.

There are similar reports on the data breach at TalkTalk, where reportedly 550 million records were stolen. Another shocking fact about this attack is that a 16-year old kid was responsible for it, showing that age is not all that matters when it comes to hacking huge databases.

In the future, hackers could potentially break into systems operating on computers that controls important technological equipment that manages water levels, gas pressure, train networks etc. By taking control of these systems, hackers can change the operational settings or manually create chaos. This could potentially have a destructive effect.

Based on the research conducted by experts, it was confirmed that this was definitely possible. Although reports of such events haven’t reached the public yet, it may have happened already.

International Incidents and Machine Learning

That Matthew Bevan and Richard Price accessed and gained sensitive material from a North Korean nuclear facility, imagine what could happen if they were able to launch one of the missiles. These two hackers infiltrated the North Korean systems through U.S. systems. Which, at the time, nearly started an international incident. Such a catastrophic event could have an immediate effect on civilians all over the world.

Many security companies build security solutions based on machine learning algorithms. Yet, hackers are using the exact same technology to build attacks. For example, spear phishing emails target high-profile individuals and hackers could deploy a machine learning project in order to create very relevant and personal emails, which will yield a much higher click-through-rate.

Furthermore, most antivirus scanners use a detection system that is connected to a database with known types of viruses, malware, Trojans etc. When there’s a match, the virus scanner will alert you. However, increasingly sophisticated malware can be created by machine learning and possibly modify the code of the malware slightly so it will bypass any virus scanner.

So, what can you do to protect yourself?

First, you will never be able to control the outcome of every breach, no matter what personal security measures you take. However, there are a few things you can do to minimize the risk.

1) Unique Passwords

Never use the same password. Password security is a real problem. Preferably, use a lengthy and complex password. If you run out of ideas, simply download a password generator and save it in a secure place in case you can’t remember it. It would be best to write down the username and password on a piece of paper though.

2) Change Passwords

For example, Yahoo’s database was breached in 2013 & 2014, yet they reported it to the public in 2016. This is a perfect example to change your passwords regularly. You’re not always aware of the fact that your information has been compromised in time.

3) Two-factor Authentication

Two-factor authentication is based on real-time authentication methods asking you to allow to login. It could either be a message with a unique code that you receive on your phone or an app such as Google Authenticator, which refreshes to a unique code every ~10-20 seconds.

TAGGED: AI, AI and big data, artificial intelligence, big data, cybercrime, cybersecurity, data breach, security holes
Bill Hess February 9, 2018
Share This Article
Facebook Twitter Pinterest LinkedIn
Share
By Bill Hess
Bill here from PixelPrivacy.com. My blog is all about making the world of online security accessible to everyone. I pride myself in writing guides that I’m certain even my own mom could read! Be sure to head over to my blog if you’re interested in keeping your private information just that: Private!

Follow us on Facebook

Latest News

IoT Cybersecurity
4 Common Misconceptions Surrounding IoT Cybersecurity Compliance
Internet of Things
iot and cloud technology
IoT And Cloud Integration is the Future!
Internet of Things
ai in marketing
4 Ways AI Can Improve Your Marketing Strategy
Artificial Intelligence
data security unveiled
Data Security Unveiled: Protecting Your Information in a Connected World
Security

Stay Connected

1.2k Followers Like
33.7k Followers Follow
222 Followers Pin

You Might also Like

data security unveiled
Security

Data Security Unveiled: Protecting Your Information in a Connected World

8 Min Read
data security
Data Management

NIST 800-171 Safeguards Help Non-Federal Networks Handling CUI

5 Min Read
child online safety data
Big Data

Empowering Parents With Big Data: Ensuring Child Safety And Development

13 Min Read
data integrity
Data Management

Security In Automated Document Processing: Ensuring Data Integrity And Confidentiality

7 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?