By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData Collective
  • Analytics
    AnalyticsShow More
    predictive analytics in dropshipping
    Predictive Analytics Helps New Dropshipping Businesses Thrive
    12 Min Read
    data-driven approach in healthcare
    The Importance of Data-Driven Approaches to Improving Healthcare in Rural Areas
    6 Min Read
    analytics for tax compliance
    Analytics Changes the Calculus of Business Tax Compliance
    8 Min Read
    big data analytics in gaming
    The Role of Big Data Analytics in Gaming
    10 Min Read
    analyst,women,looking,at,kpi,data,on,computer,screen
    Promising Benefits of Predictive Analytics in Asset Management
    11 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-23 SmartData Collective. All Rights Reserved.
Reading: Will Hackers Eventually Use Big Data and AI Against Us?
Share
Notification Show More
Latest News
ai digital marketing tools
Top Five AI-Driven Digital Marketing Tools in 2023
Artificial Intelligence
ai-generated content
Is AI-Generated Content a Net Positive for Businesses?
Artificial Intelligence
predictive analytics in dropshipping
Predictive Analytics Helps New Dropshipping Businesses Thrive
Predictive Analytics
cloud data security in 2023
Top Tools for Your Cloud Data Security Stack in 2023
Cloud Computing
become a data scientist
Boosting Your Chances for Landing a Job as a Data Scientist
Jobs
Aa
SmartData Collective
Aa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Business Intelligence > Artificial Intelligence > Will Hackers Eventually Use Big Data and AI Against Us?
Artificial IntelligenceBig DataExclusiveITSecurity

Will Hackers Eventually Use Big Data and AI Against Us?

Bill Hess
Last updated: 2018/02/08 at 8:30 PM
Bill Hess
6 Min Read
AI and big data
Shutterstock Licensed Photo - By Panchenko Vladimir
SHARE

As our technology develops into the future, the chance that hackers might deliver an enormous destructive blow to the public is growing along that curve. It could be self-organized and independent hacker groups, nation-organized hacker groups or even cyberterrorists. That being said, the threat is real.

Contents
Complex Hacks are Made Easier Thanks to AIData Integrity HacksInternational Incidents and Machine LearningSo, what can you do to protect yourself?1) Unique Passwords2) Change Passwords3) Two-factor Authentication

There are numerous movies showing examples of what hackers are capable of with big data hacks and what the impact of such an attack means. For example, switching off all electricity in a city, launching missiles at civilians, police stations or another army base. Hackers might be able to take control of important systems and do whatever they please for a certain amount of time.

Complex Hacks are Made Easier Thanks to AI

However, security experts have mentioned that such massively impactful hacks are not caused by a few simple tweaks in a system or a minor breach in the security defenses. Although, hackers could deploy an AI to slowly penetrate the system over time and transition slowly to a situation in which they have full control. The strategy would be to create minor changes that appear to happen naturally in order to avoid detection.

When it comes to big data, hackers could damage or tweak big data sets with relatively small adjustments in order to benefit from that. It could be, in some ways, harmless to the public but hackers could exploit yearly financial business reports for a personal advantage. Such changes in financial reporting models could also change the decision-making of CEO’s, traders, bankers and other people who base their decisions on these financial reports.

More Read

cybersecurity simulations

Combat AI-Powered Threats with Cybersecurity Simulations & Other Practices

Utilizing Data to Discover Shortcomings Within Your Business Model
Small Businesses Use Big Data to Offset Risk During Economic Uncertainty
The Importance of Data-Driven Approaches to Improving Healthcare in Rural Areas
How Big Data Is Transforming the Renewable Energy Sector

Data Integrity Hacks

A variant on these big data hacks is data-integrity hacks. The largest data breach ever discovered was reported not too long ago. Yahoo confirmed two major breaches in their database in September and December of 2016, however, the breach occurred way earlier than reported. Yahoo confirmed that these two data breaches took place in August 2013 and late 2014. All of their 3 billion users were affected by this attack.

There are similar reports on the data breach at TalkTalk, where reportedly 550 million records were stolen. Another shocking fact about this attack is that a 16-year old kid was responsible for it, showing that age is not all that matters when it comes to hacking huge databases.

In the future, hackers could potentially break into systems operating on computers that controls important technological equipment that manages water levels, gas pressure, train networks etc. By taking control of these systems, hackers can change the operational settings or manually create chaos. This could potentially have a destructive effect.

Based on the research conducted by experts, it was confirmed that this was definitely possible. Although reports of such events haven’t reached the public yet, it may have happened already.

International Incidents and Machine Learning

That Matthew Bevan and Richard Price accessed and gained sensitive material from a North Korean nuclear facility, imagine what could happen if they were able to launch one of the missiles. These two hackers infiltrated the North Korean systems through U.S. systems. Which, at the time, nearly started an international incident. Such a catastrophic event could have an immediate effect on civilians all over the world.

Many security companies build security solutions based on machine learning algorithms. Yet, hackers are using the exact same technology to build attacks. For example, spear phishing emails target high-profile individuals and hackers could deploy a machine learning project in order to create very relevant and personal emails, which will yield a much higher click-through-rate.

Furthermore, most antivirus scanners use a detection system that is connected to a database with known types of viruses, malware, Trojans etc. When there’s a match, the virus scanner will alert you. However, increasingly sophisticated malware can be created by machine learning and possibly modify the code of the malware slightly so it will bypass any virus scanner.

So, what can you do to protect yourself?

First, you will never be able to control the outcome of every breach, no matter what personal security measures you take. However, there are a few things you can do to minimize the risk.

1) Unique Passwords

Never use the same password. Password security is a real problem. Preferably, use a lengthy and complex password. If you run out of ideas, simply download a password generator and save it in a secure place in case you can’t remember it. It would be best to write down the username and password on a piece of paper though.

2) Change Passwords

For example, Yahoo’s database was breached in 2013 & 2014, yet they reported it to the public in 2016. This is a perfect example to change your passwords regularly. You’re not always aware of the fact that your information has been compromised in time.

3) Two-factor Authentication

Two-factor authentication is based on real-time authentication methods asking you to allow to login. It could either be a message with a unique code that you receive on your phone or an app such as Google Authenticator, which refreshes to a unique code every ~10-20 seconds.

TAGGED: AI, AI and big data, artificial intelligence, big data, cybercrime, cybersecurity, data breach, security holes
Bill Hess February 9, 2018
Share this Article
Facebook Twitter Pinterest LinkedIn
Share
By Bill Hess
Bill here from PixelPrivacy.com. My blog is all about making the world of online security accessible to everyone. I pride myself in writing guides that I’m certain even my own mom could read! Be sure to head over to my blog if you’re interested in keeping your private information just that: Private!

Follow us on Facebook

Latest News

ai digital marketing tools
Top Five AI-Driven Digital Marketing Tools in 2023
Artificial Intelligence
ai-generated content
Is AI-Generated Content a Net Positive for Businesses?
Artificial Intelligence
predictive analytics in dropshipping
Predictive Analytics Helps New Dropshipping Businesses Thrive
Predictive Analytics
cloud data security in 2023
Top Tools for Your Cloud Data Security Stack in 2023
Cloud Computing

Stay Connected

1.2k Followers Like
33.7k Followers Follow
222 Followers Pin

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

[mc4wp_form id=”1616″]

You Might also Like

cybersecurity simulations
Artificial IntelligenceExclusiveITSecurity

Combat AI-Powered Threats with Cybersecurity Simulations & Other Practices

7 Min Read
utlizing big data for business model
Big Data

Utilizing Data to Discover Shortcomings Within Your Business Model

6 Min Read
big data use in small businesses
Big Data

Small Businesses Use Big Data to Offset Risk During Economic Uncertainty

7 Min Read
data-driven approach in healthcare
Analytics

The Importance of Data-Driven Approaches to Improving Healthcare in Rural Areas

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive
AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US

© 2008-23 SmartData Collective. All Rights Reserved.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?