pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

The Double-Edged Sword of Machine Learning in Cybersecurity

Today’s most damaging threats, from phishing to ransomware, will use machine learning to analyze vast amounts of information about their victims and design more sophisticated attacks. Artificial intelligence could become the basis for more personalized and effective malware. However, these algorithms could also be the foundation for the future fight against cybercrime: predicting attacks before they occur based on suspicious behavior.

Determining what MDR is, why you need it, and which offering is right for you may seem like a lot to figure out. Fortunately, there are many great resources to help you do just that, like the 2020 market guide for managed detection and response services.

Here is a real world example where machine learning could be used to launch a malware attack. A few weeks before your company’s Christmas dinner, you receive an email from the person who is organizing it. He uses his usual language and tone and sends you a couple of files saying that these are the menus of the two possible restaurants you could go to, so that you can vote for your favorite. When you open the first one, the file has hidden ‘malware’ that is downloaded to your computer.

In reality, that email, received at a time and in a way that was not suspicious, is written by a malicious tool that has imitated the behavior of the person who supposedly wrote it to trick you into getting a virus on your computer.

Although this scenario still sounds a bit like science fiction, experts point out that it is unfortunately the future of cybercrime: hostile programs that are able to learn to inflict as much damage as possible thanks to the data collected. “We are already beginning to see intelligent ‘malware’ that uses advanced techniques, including artificial intelligence, to carry out slow, quiet attacks,” Emily Orton, product manager for Darktrace, a cyber security company that seeks to use artificial intelligence to address computer threats, told HojaDeRouter.com.

Over time, the tools used by criminals will be able to store and analyze information about user behavior and, as a result, emulate them to gain access to the Internet at different times. “They will also be able to create highly personalized attacks against specific individuals, because they will understand their interests, their habits and their social groups,” he adds.

In fact, it is already possible to teach different artificial intelligence programs how to imitate writing styles: from attempts by Guardian publishers – with a lack of content, of course – to newspaper articles that provide the key information in circumstances where data – from the stock market or a sporting event, for example – can form the basis of information.

Many companies hire ethical hackers with a background in machine learning

Artificial intelligence will also lay the foundations for the future fight against cybercrime

As these systems evolve and are able to fine-tune their literary output and understand users’ tastes and movements at a deeper level, intelligent malware will be used to develop more elaborate versions of different scams, such as the famous boss email. In this scam, the impersonator pretends to be a company executive using an almost identical email address. In the message, he requests that a money transfer be made, which is not uncommon if the impersonator is a senior manager in the company. According to FBI estimates, this type of attack has already cost the affected businesses a whopping $23 billion (about 20 billion euros), and yet there is still a human hand behind them, without an artificial intelligence to facilitate the process.

This will not be the only attack that will increase their effectiveness. The sadly popular ‘ransomware’ (which hijacks some of the information from the infected system and demands a ransom in exchange for lifting the restriction) could also take advantage of the development of artificial intelligence to fine-tune its targets, choosing more precisely the data it must capture to force payment.

“Cybercriminals will be able to take advantage of artificial intelligence and machine learning to make their malware smarter, which means cyber security will always be one step ahead,” Nitesh Chawla, a professor and member of the research team that created AI2, a system that predicts cyberattacks through machine learning, told HojaDeRouter.com.

While artificial intelligence could become the basis for more personalized and effective malware, these algorithms may also be the foundation for the future fight against cybercrime.

Filed Under: Articles

Latest Articles

General Midi

In September of 1991 the MIDI Manufacturers Association (MMA) and the Japan MIDI Standards Committee (JMSC) created the beginning of a new era in MIDI technology, by adopting the General MIDI System Level 1, referred to as GM or GM1. … [Read More...]

(no title)

Interesting tidbit about app indexing for both Apple and Google. Google already has put into motion ways of indexing an app which may prove to be a boom for apps that have user generated content.  Providing that content can be parsed and delivered correctly to users in a way that is meaningful.  The … [Read More...]

Advantages and disadvantages of using Perl in web programming

Web pages are designed using programming codes and a number of technologies as tools to achieve the desired objectives. An example of the above described, are the pages of animations in which you use resources such as HTML5 or OpenGL programming language, among others. However, there are simple to … [Read More...]

Everything You Need to Know About Sourcing Circuit Boards From U.S. Suppliers

In This Article This article includes: Why Source PCBs From the United States?How to Get a Quote From a U.S.-Based PCB ManufacturerThe Top U.S. … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

2000 Site Updates

Date Details of updates 19Dec '00 Chipsets: Section added on Intel's 850 Chipset, designed for use in conjunction with its Pentium 4 … [Read More...]

CMOS – complementary metal oxide silicon – RAM chips on motherboards

Motherboards also include a separate block of memory made from very low power consumption CMOS (complementary metal oxide silicon) RAM chips, … [Read More...]

External graphics cards: are they worth the investment?

When we hear about external graphics cards (also known as eGPUs) we can't help but think about how promising the concept is. You can get … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors