Hackers have found a toy for the cloud, artificial intelligence. And this is not good news for us. Cyber criminals cyber and use it to launch attacks to be more frequent, more targeted, and more effective. A nightmare is real, for the safety and security of businesses and individuals.
Hackers in IT: the Attacks, the most common and lethal
Splunk, a company HE has set up the alarm. In the report of the latter, they discover that the use of the hackers is on the rise. The attacks are doubled in the year to the end. But it's not just a matter of quantity. Thanks to HIM, the hackers can make the malware more advanced, of them the most credible phishing and strategies for custom assault, for each of the victims. In other words, they hit more often and more accurately.
But, as well as the use of the hackers HIM to waive the protection of our own? Simple: they train him to be information stolen, to understand how the operating systems of our safety and security. They then create the abilities that have been made accessible to circumvent them by using the weakness to the eyes of the man he fought for. And it doesn't end there. They are using the chatbot, and the falsification of in-depth at the beginning of the user, and to steal the credentials. A gun, 360-degree, which strikes as well as vehicles as well as humans.
The company papërgatitura, and at-risk
Unfortunately, the companies that seem to be papërgatitura to cope with this new threat. Only a small percentage use IT to defend yourself, while nearly all of the hackers use it to attack. And even those who use it often don't know how to use it as much as possible. The result? We are exposed to attacks, as well as a boxer, which is detected.
Intelligent man-but change is also profoundly affected the world of cyber security. And not always for the better. While on the one hand it offers new possibilities to protect themselves, on the other hand, it gives hackers a weapon of death for our attack.
To win this battle, companies need to understand the extent of the threat, and to invest in the protection of evidence-based as well as train the staff to use them to their full potential to the full. This is the only way they can hope to resist hackers becoming more cunning and unscrupulous. The stakes are high: all the details of our money, our identity, our very digital.
Discussion about this post