What Happens If Criminals & Terrorists Get To Use AI

Criminals could use artificial intelligence to commit "terrorist acts or murders". Jason Fry, a specialist at PAV i.t. services says internet fraudsters caused £1 billion of damages to companies across the UK last year but chillingly warned that bad guys will be after more than just money in 2017.

He believes more than ever there are very real possibilities of cyber crime being used to execute large-scale terrorist attacks, assassinations and even murders.

And the emerging market of driverless cars, which are also able to park themselves and be controlled remotely, along with medicines that can be self-administered by personal devices and the popularity of drones gives us an indication of the automation which can be expected in the future.

He said: "Cyber criminals with a more sinister agenda than breaching data in return for financial reward will be able to take advantage of technology in order to execute terrorist acts or murders.

"For example, by hacking medical devices to administer lethal dosages to victims."

As programmes like Humans and West World play out a fictional world of cyborgs turning on mankind, he took a look at the growing number of cyber threats both to businesses and individuals, and he thinks fiction is quickly becoming fact.

Advances in artificial intelligence have created a swathe of new opportunities for criminals which could be potentially world ending.

And ransomware, the increasingly common trend of holding a computer and its associated data hostage until the victim pays a large sum for its release, has been causing huge problems for businesses across the globe and according to Mr Fry, is a trend that is set to continue in 2017.

Mr Fry said: "There seems to be no sign of this trend diminishing in the near future and certainly where ransomware is concerned the fraudsters are consistently refining and updating its capabilities resulting in versions that are even self-propagating.

"Information can now be encrypted much quicker, which can also play into the hands of the hackers.

"Criminals using ransomware can swiftly encrypt large amounts of data, often before a company even realises it is under attack."

He said stealing confidential data also presents threats to businesses, and thinks this will only increase in 2017.

Kent Live

You Migh Aslo Read: 

Artificial Intelligence Is A Fascist's Dream:

The New Face of Cybersecurity:

 

« What Healthcare CISOs Should Know
Just Who Are Russia's Cyber Warriors? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Tiro Security

Tiro Security

Tiro Security is a boutique company specializing in information security and IT audit recruitment and solutions.

RiskLens

RiskLens

RiskLens is a software company that specializes in the quantification of cybersecurity risk.

Holm Security

Holm Security

Holm Security are taking vulnerability assessment into the next generation as a cloud service.

IT Association of Slovakia (ITAS)

IT Association of Slovakia (ITAS)

ITAS is a professional association of domestic and foreign companies operating in the field of information and communication technologies

SAS Institute

SAS Institute

SAS is a leader in business analytics software and services providing solutions for a wide range of critical business areas including risk management, compliance and fraud prevention.

Woz U

Woz U

Woz U provides best-in-class technology training for Learners, Higher-Ed and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber Security.

Center for Long-Term Cybersecurity (CLTC)

Center for Long-Term Cybersecurity (CLTC)

The Center for Long-Term Cybersecurity is developing and shaping cybersecurity research and practice based on a long-term vision of the internet and its future.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

Naoris

Naoris

Naoris is the world’s first holistic blockchain-based cybersecurity ecosystem, bringing a game-changing solution to address 35 years of industry similar practice.

AiCULUS

AiCULUS

AiCULUS is a global technology company that specializes in API security and Risk Management products.

SIRP Labs

SIRP Labs

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response.

Cyber Dacians

Cyber Dacians

Cyber Dacians offers Information and Cyber Security Consulting Services. We help you to test the effectiveness of your security defenses and build a secure infrastructure.

ATSG

ATSG

ATSG is a global leader in transformational technology solutions for today’s digital enterprise. Cybersecurity ranging from Advisory & Assessment to Fully Managed Detection and Response Services.

Vertex Cyber Security

Vertex Cyber Security

Vertex provide Cyber Security Services to small to large businesses including Advise, Consulting, Adding Security Partnership, Penetration Testing, ISO 27001-2 and Audits.

TrueBees

TrueBees

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web.

AirMDR

AirMDR

Designed by experts, AirMDR solutions cater to the unique demands of security operations centers.