What Happens If Criminals & Terrorists Get To Use AI

Criminals could use artificial intelligence to commit "terrorist acts or murders". Jason Fry, a specialist at PAV i.t. services says internet fraudsters caused £1 billion of damages to companies across the UK last year but chillingly warned that bad guys will be after more than just money in 2017.

He believes more than ever there are very real possibilities of cyber crime being used to execute large-scale terrorist attacks, assassinations and even murders.

And the emerging market of driverless cars, which are also able to park themselves and be controlled remotely, along with medicines that can be self-administered by personal devices and the popularity of drones gives us an indication of the automation which can be expected in the future.

He said: "Cyber criminals with a more sinister agenda than breaching data in return for financial reward will be able to take advantage of technology in order to execute terrorist acts or murders.

"For example, by hacking medical devices to administer lethal dosages to victims."

As programmes like Humans and West World play out a fictional world of cyborgs turning on mankind, he took a look at the growing number of cyber threats both to businesses and individuals, and he thinks fiction is quickly becoming fact.

Advances in artificial intelligence have created a swathe of new opportunities for criminals which could be potentially world ending.

And ransomware, the increasingly common trend of holding a computer and its associated data hostage until the victim pays a large sum for its release, has been causing huge problems for businesses across the globe and according to Mr Fry, is a trend that is set to continue in 2017.

Mr Fry said: "There seems to be no sign of this trend diminishing in the near future and certainly where ransomware is concerned the fraudsters are consistently refining and updating its capabilities resulting in versions that are even self-propagating.

"Information can now be encrypted much quicker, which can also play into the hands of the hackers.

"Criminals using ransomware can swiftly encrypt large amounts of data, often before a company even realises it is under attack."

He said stealing confidential data also presents threats to businesses, and thinks this will only increase in 2017.

Kent Live

You Migh Aslo Read: 

Artificial Intelligence Is A Fascist's Dream:

The New Face of Cybersecurity:

 

« What Healthcare CISOs Should Know
Just Who Are Russia's Cyber Warriors? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

JYVSECTEC - JAMK University of Applied Sciences

JYVSECTEC - JAMK University of Applied Sciences

JYVSECTEC is a cyber security research and development and training centre

Promon

Promon

Promon is an application security vendor providing Self-Protection abilities to Mobile apps and Desktop applications.

CERT-AM

CERT-AM

CERT-AM is the national Computer Emergency Response Team for Armenia.

Blue Lights Digital

Blue Lights Digital

Blue Lights Digital have developed a range of platforms to support digital investigations, as well as providing continued support and education for investigations professionals.

NSHC

NSHC

NSHC is a provider of mobile security solutions, cyber security consulting and training, and offensive research.

SenseOn

SenseOn

SenseOn’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

ACPL Systems

ACPL Systems

We offer leading-edge technology solutions, expert professional and managed services and proven methodologies to ensure your data is protected and business risks are reduced.

Very Good Security (VGS)

Very Good Security (VGS)

VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it.

Belden

Belden

Belden is a global leader in signal transmission and security solutions for mission-critical applications in enterprise and industrial markets. Belden brands include Hirschmann and Tofino Security.

NINJIO

NINJIO

NINJIO is a leader in cybersecurity awareness training. View IT Security Awareness through a different lens - entertain and educate your users through storytelling.

CITRA - Information Security and Emergency Response

CITRA - Information Security and Emergency Response

CITRA is responsible for overseeing the telecommunications sector, monitoring and protecting the interests of users and service providers, and regulating the services of telecomms networks in Kuwait.

Panacea Infosec

Panacea Infosec

Panacea Infosec is a leading provider of information security compliance services. We help our clients in protecting their data, reducing security risks and fighting cybercrime.

Kintek Group

Kintek Group

Kintek Group provides cybersecurity and managed services to protect organizations from threats that exist inside and outside their networks.

Oort

Oort

Oort is an identity threat detection and response platform for enterprise security. The Oort platform is API-driven, cloud-native and agentless for rapid time to value and high scalability.

Endor Labs

Endor Labs

Endor Labs gives developers and security teams the context they need to prioritize open source risk.

SecureLake

SecureLake

SecureLake (formerly Managni) is one of the most trusted US-based IT security and infrastructure companies.