{"id":24772,"date":"2016-04-18T08:33:31","date_gmt":"2016-04-18T15:33:31","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/2016\/04\/artificial-intelligences-ultimate-challenge-cyber-attacks"},"modified":"2017-04-24T21:16:20","modified_gmt":"2017-04-25T04:16:20","slug":"artificial-intelligences-ultimate-challenge-cyber-attacks","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2016\/04\/artificial-intelligences-ultimate-challenge-cyber-attacks","title":{"rendered":"Artificial Intelligence\u2019s Ultimate Challenge? Cyber Attacks"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/artificial-intelligences-ultimate-challenge-cyber-attacks.jpg\"><\/a><\/p>\n<p>AI is hackable as long as it\u2019s underpinning technology is still supported on legacy platform technology and connected to a legacy infrastructure. Only when the underpinning technology &amp; net infrastructure is updated to Quantum will we see a secured AI environment.<\/p>\n<hr>\n<p>At MIT, machine learning specialists are training deep learning algorithms to spot cyber attacks. It may be AI\u2019s ultimate test.<\/p>\n<p><!-- Link: <a href=\"http:\/\/www.fastcodesign.com\/3058908\/artificial-intelligences-ultimate-challenge-cyber-terrorism\">http:\/\/www.fastcodesign.com\/3058908\/artificial-intelligences...-terrorism<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI is hackable as long as it\u2019s underpinning technology is still supported on legacy platform technology and connected to a legacy infrastructure. Only when the underpinning technology &amp; net infrastructure is updated to Quantum will we see a secured AI environment. At MIT, machine learning specialists are training deep learning algorithms to spot cyber attacks. [\u2026]<\/p>\n","protected":false},"author":395,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,41,1617,6],"tags":[],"class_list":["post-24772","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-information-science","category-quantum-physics","category-robotics-ai"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/24772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/395"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=24772"}],"version-history":[{"count":2,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/24772\/revisions"}],"predecessor-version":[{"id":50788,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/24772\/revisions\/50788"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=24772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=24772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=24772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}