What Happens If Criminals & Terrorists Get To Use AI

Criminals could use artificial intelligence to commit "terrorist acts or murders". Jason Fry, a specialist at PAV i.t. services says internet fraudsters caused £1 billion of damages to companies across the UK last year but chillingly warned that bad guys will be after more than just money in 2017.

He believes more than ever there are very real possibilities of cyber crime being used to execute large-scale terrorist attacks, assassinations and even murders.

And the emerging market of driverless cars, which are also able to park themselves and be controlled remotely, along with medicines that can be self-administered by personal devices and the popularity of drones gives us an indication of the automation which can be expected in the future.

He said: "Cyber criminals with a more sinister agenda than breaching data in return for financial reward will be able to take advantage of technology in order to execute terrorist acts or murders.

"For example, by hacking medical devices to administer lethal dosages to victims."

As programmes like Humans and West World play out a fictional world of cyborgs turning on mankind, he took a look at the growing number of cyber threats both to businesses and individuals, and he thinks fiction is quickly becoming fact.

Advances in artificial intelligence have created a swathe of new opportunities for criminals which could be potentially world ending.

And ransomware, the increasingly common trend of holding a computer and its associated data hostage until the victim pays a large sum for its release, has been causing huge problems for businesses across the globe and according to Mr Fry, is a trend that is set to continue in 2017.

Mr Fry said: "There seems to be no sign of this trend diminishing in the near future and certainly where ransomware is concerned the fraudsters are consistently refining and updating its capabilities resulting in versions that are even self-propagating.

"Information can now be encrypted much quicker, which can also play into the hands of the hackers.

"Criminals using ransomware can swiftly encrypt large amounts of data, often before a company even realises it is under attack."

He said stealing confidential data also presents threats to businesses, and thinks this will only increase in 2017.

Kent Live

You Migh Aslo Read: 

Artificial Intelligence Is A Fascist's Dream:

The New Face of Cybersecurity:

 

« What Healthcare CISOs Should Know
Just Who Are Russia's Cyber Warriors? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Paramount Computer Systems

Paramount Computer Systems

Paramount is a regional leader in the Middle East for cybersecurity solutions and consulting services.

CSIRT-NQN

CSIRT-NQN

CSIRT-NQN is the Computer Incident Response Team for the Argentine province of Neuquen.

Open Connectivity Foundation (OCF)

Open Connectivity Foundation (OCF)

OCF is dedicated to ensuring secure interoperability ensuring secure interoperability of IoT for consumers, businesses and industries.

972VC

972VC

972VC was created to help entrepreneurs find potential funding for their startups. Your guide to the Israeli startup funding ecosystem.

Onfido

Onfido

Onfido is building the new identity standard for the internet. We digitally prove people’s real identities using a photo ID and facial biometrics.

ANSEC IA

ANSEC IA

ANSEC is a consultancy practice providing independent Information Assurance and IT Security focussed services to customers throughout the UK, Ireland and internationally.

Cybaverse

Cybaverse

Cybaverse (formerly North Star Cyber Security) was founded to create the perfect blend of a Managed Security Service Provider (MSSP) and a Cyber Security Consultancy in one.

HarfangLab

HarfangLab

HarfangLab develops a hunting software to boost detection and neutralization of cyberattacks against companies endpoints.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

CYDEF

CYDEF

CYDEF provides comprehensive, state-of-the-art cybersecurity protection that is accessible and affordable to organizations of any size.

Mode Solutions

Mode Solutions

Mode guarantee IT performance where you need it most, creating seamless and secure solutions that will alleviate pressure from your business.

Gorilla Technology Group

Gorilla Technology Group

Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes.

Archer Technologies

Archer Technologies

Archer helps organizations manage risk in the digital era—uniting stakeholders, integrating technologies and transforming risk into reward.

Modern Networks

Modern Networks

Modern Networks is a leading provider of IT managed services to the UK’s commercial property sector and medium sized enterprises.

DART Consulting & Training

DART Consulting & Training

DART is a leading cyber training and consultancy company. We enhance our clients’ cyber capabilities by growing and strengthening their frontline defense – the cyber teams.

Reveald

Reveald

Reveald is making Exposure Management a reality to solve the biggest challenges in cybersecurity with a trailblazing ‘offense to defense’ approach that gives the advantage back to the business.