{"id":40097,"date":"2023-02-09T16:28:08","date_gmt":"2023-02-09T16:28:08","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/"},"modified":"2023-02-09T16:29:19","modified_gmt":"2023-02-09T16:29:19","slug":"5-ai-technologies-hackers-can-use-in-terrible-new-ways","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/","title":{"rendered":"5 AI Technologies Hackers Can Use in Terrible New Ways"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<\/p>\n<div>\n<!-- UNCACHED CONTENT --><\/p>\n<figure style=\"width: 1200px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"type:primaryImage size-full wp-image-869434\" data-pagespeed-no-defer=\"\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/www.howtogeek.com\/wp-content\/uploads\/2023\/01\/52558846816_6a03944002_k.jpg?width=1198&amp;trim=1,1&amp;bg-color=000&amp;pad=1,1\" alt=\"Closeup of the Vissles LP85 keyboard with a green backlight\" width=\"1200\" height=\"675\"\/><figcaption class=\"wp-caption-text\"><span class=\"type:primaryImage imagecredit\">Andrew Heinzman \/ How-To Geek<\/span><\/figcaption><\/figure>\n<p>AI applied sciences could also be disrupting quite a few industries, however at the least usually, we are able to see how they\u2019ll be extra helpful than dangerous in the long term. Nonetheless, these new instruments are additionally opening many new alternatives for nefarious varieties.<\/p>\n<h2 role=\"heading\" aria-level=\"2\">Pure Language AI for Supercharged Phishing Assaults<\/h2>\n<p>With the ability to perceive and produce pure human language has been one of many prime objectives of AI analysis from the earliest days. Right now, we&#8217;ve artificial voice manufacturing, highly-sophisticated chatbots, pure language textual content mills, and plenty of extra associated AI-driven applied sciences.<\/p>\n<p>These functions are excellent for <a href=\"https:\/\/www.howtogeek.com\/437513\/what-should-you-do-if-you-receive-a-phishing-email\/\">phishing attacks<\/a>, the place hackers pose as reputable entities and their representatives as a technique to get delicate info out of individuals. With these new applied sciences, you can have AI brokers impersonate folks en-masse <a href=\"https:\/\/www.howtogeek.com\/829504\/what-is-email-spoofing\/\">through email<\/a>, phone calls, on the spot messaging, or wherever else people speak to one another by means of a pc system.<\/p>\n<p>Not like the phishing we all know, this might be like turbo-charged <a href=\"https:\/\/www.howtogeek.com\/142635\/htg-explains-what-spear-phishing-attacks-are-and-why-theyre-taking-down-big-corporations\/\">\u201cspear\u201d phishing<\/a>, the place the makes an attempt are focused in opposition to particular people with details about them specifically to make the rip-off simpler. For instance, the AI software program might pose as somebody\u2019s boss and ask for cash to be paid into an account in a variant of phishing often known as CEO fraud.<\/p>\n<h2 role=\"heading\" aria-level=\"2\">Deepfaked Social Engineering<\/h2>\n<p><a href=\"https:\/\/www.howtogeek.com\/180186\/htg-explains-what-is-social-engineering-and-how-can-you-avoid-it\/\">Social engineering<\/a> is a observe inside hacking that targets weaknesses in human psychology and habits to get round robust technological safety measures. For instance, a hacker would possibly telephone an essential individual\u2019s secretary posing as a sanitation employee, asking them about the place their trash is presently thrown out. Then the prison heads to that location to search for discarded paperwork or different clues that may be pieced collectively to create exploits.<\/p>\n<p>Deep studying methods that may replicate faces and voices (often known as\u00a0<a href=\"https:\/\/www.howtogeek.com\/427224\/what-is-a-deepfake-and-should-i-be-concerned\/\">deepfakes<\/a>) have superior to the purpose the place they can be utilized in real-time. There are providers like <a href=\"https:\/\/podcastle.ai\/products\/revoice\">Podcastle\u2019s Revoice<\/a>\u00a0and <a href=\"https:\/\/voicebot.ai\/\">Voicebot AI<\/a> the place you possibly can submit samples of your individual voice after which have text-to-speech that sounds identical to you. In precept, expertise like this may very well be used to clone anybody\u2019s voice. Then all you\u2019d need to do is telephone or video name somebody impersonating whomever you want, with public figures being the simplest goal of all.<\/p>\n<h2 role=\"heading\" aria-level=\"2\">Smarter Code Cracking and Automated Vulnerability Discovery<\/h2>\n<p>It takes people hours and hours to scour traces of code to search for vulnerabilities, both to repair them or exploit them. Now we\u2019ve seen that machine studying fashions equivalent to <a href=\"https:\/\/openai.com\/blog\/chatgpt\/\">ChatGPT<\/a> can each write code and <a href=\"https:\/\/cyberscoop.com\/chatgpt-ai-malware\/\">recognize vulnerabilities in submitted code<\/a>, which opens up the chance that AI may very well be writing malware sooner quite than later.<\/p>\n<h2 role=\"heading\" aria-level=\"2\">Malware That Learns and Adapts By Machine Studying<\/h2>\n<p>The important thing energy of machine studying is the way it can take large quantities of information and extract helpful guidelines and insights from it. It\u2019s affordable to count on that future malware might reap the benefits of this normal idea to adapt to countermeasures quickly.<\/p>\n<p>This will likely result in a state of affairs the place each malware and <a href=\"https:\/\/www.howtogeek.com\/794451\/best-antivirus-software\/\">anti-malware systems<\/a> successfully turn into warring machine studying methods that quickly drive one another to larger ranges of sophistication.<\/p>\n<h2 role=\"heading\" aria-level=\"2\">Generative AI to Create Faux Knowledge<\/h2>\n<p>AI applied sciences can now <a href=\"https:\/\/www.howtogeek.com\/830870\/best-ai-image-generators\/\">generate images<\/a>, video, textual content, and audio seemingly out of skinny air. These applied sciences have reached the purpose the place consultants can&#8217;t inform they\u2019re pretend (at the least not at a look). This implies you possibly can count on a flood of faux information on the web in future.<\/p>\n<p>For instance, pretend social media profiles proper now might be pretty straightforward to identify, so avoiding <a href=\"https:\/\/www.howtogeek.com\/714763\/what-does-catfishing-mean-online\/\">catfishing scams<\/a> or easy bot campaigns to sow disinformation hasn\u2019t been that onerous for knowledgeable audiences. Nonetheless, these new AI applied sciences might generate <a href=\"https:\/\/www.howtogeek.com\/416136\/fake-linkedin-profiles-are-impossible-to-detect\/\">fake profiles that are indistinguishable from real ones<\/a>.<\/p>\n<p>\u201cIndividuals\u201d with <a href=\"https:\/\/thispersondoesnotexist.com\/\">unique faces<\/a>\u00a0with generated images of their whole pretend lives, distinctive coherent profile info, and full pal and household networks consisting of different pretend folks. All having conversations with one another identical to actual folks. With networks of faux on-line brokers equivalent to these, malicious actors might pull off varied scams and disinformation campaigns.<\/p>\n<p><strong>RELATED:<\/strong> <a href=\"https:\/\/www.howtogeek.com\/842135\/5-technologies-that-mean-you-can-never-believe-anything-on-the-internet-again\/\"><strong><em>5 Technologies That Mean You Can Never Believe Anything on the Internet Again<\/em><\/strong><\/a><\/p>\n<h2 role=\"heading\" aria-level=\"2\">Is AI Each the Remedy and the Illness?<\/h2>\n<p>It\u2019s inevitable that some folks will attempt to use any new expertise for malicious causes. What makes this new era of AI expertise completely different is the way it\u2019s rapidly going past human functionality to detect it.<\/p>\n<p>This implies, considerably mockingly, that our greatest protection in opposition to these AI-enhanced avenues of assault might be different AI applied sciences that combat hearth with hearth. This would appear to depart you with no selection however to observe them duke it out and hope that the \u201cgood guys\u201d come out on high. Nonetheless, there are a number of issues you are able to do to <a href=\"https:\/\/www.howtogeek.com\/778547\/cybersecurity-tips-to-stay-protected\/\">stay protected online<\/a>, <a href=\"https:\/\/www.howtogeek.com\/174343\/ransomware-why-this-new-malware-is-so-dangerous-and-how-to-protect-yourself\/\">avoid ransomware<\/a>, and spot\u00a0scams on standard platforms like\u00a0<a href=\"https:\/\/www.howtogeek.com\/449710\/beware-these-7-facebook-scams\/\">Facebook<\/a>, <a href=\"https:\/\/www.howtogeek.com\/777685\/10-facebook-marketplace-scams-to-watch-out-for\/\">Facebook Marketplace<\/a>, <a href=\"https:\/\/www.howtogeek.com\/822725\/common-paypal-scams-and-how-to-avoid-them\/\">PayPal<\/a>, and <a href=\"https:\/\/www.howtogeek.com\/817943\/linkedin-scams-to-watch-out-for\/\">LinkedIn<\/a>.<\/p>\n<\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/www.howtogeek.com\/868238\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Andrew Heinzman \/ How-To Geek AI applied sciences could also be disrupting quite a few industries, however at the least usually, we are able to&#8230;<\/p>\n","protected":false},"author":1,"featured_media":40098,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-40097","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 AI Technologies Hackers Can Use in Terrible New Ways - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 AI Technologies Hackers Can Use in Terrible New Ways - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-09T16:28:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-09T16:29:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/52558846816_6a03944002_k.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2392\" \/>\n\t<meta property=\"og:image:height\" content=\"1342\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/09\\\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/09\\\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"5 AI Technologies Hackers Can Use in Terrible New Ways\",\"datePublished\":\"2023-02-09T16:28:08+00:00\",\"dateModified\":\"2023-02-09T16:29:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/09\\\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\\\/\"},\"wordCount\":887,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/09\\\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/52558846816_6a03944002_k.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/09\\\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/09\\\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/09\\\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\\\/\",\"name\":\"5 AI Technologies Hackers Can Use in Terrible New Ways - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/09\\\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/09\\\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/52558846816_6a03944002_k.jpg\",\"datePublished\":\"2023-02-09T16:28:08+00:00\",\"dateModified\":\"2023-02-09T16:29:19+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/09\\\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/09\\\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/09\\\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/52558846816_6a03944002_k.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/52558846816_6a03944002_k.jpg\",\"width\":2392,\"height\":1342},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/09\\\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 AI Technologies Hackers Can Use in Terrible New Ways\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 AI Technologies Hackers Can Use in Terrible New Ways - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/","og_locale":"en_US","og_type":"article","og_title":"5 AI Technologies Hackers Can Use in Terrible New Ways - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2023-02-09T16:28:08+00:00","article_modified_time":"2023-02-09T16:29:19+00:00","og_image":[{"width":2392,"height":1342,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/52558846816_6a03944002_k.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"5 AI Technologies Hackers Can Use in Terrible New Ways","datePublished":"2023-02-09T16:28:08+00:00","dateModified":"2023-02-09T16:29:19+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/"},"wordCount":887,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/52558846816_6a03944002_k.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/","url":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/","name":"5 AI Technologies Hackers Can Use in Terrible New Ways - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/52558846816_6a03944002_k.jpg","datePublished":"2023-02-09T16:28:08+00:00","dateModified":"2023-02-09T16:29:19+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/52558846816_6a03944002_k.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/52558846816_6a03944002_k.jpg","width":2392,"height":1342},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/09\/5-ai-technologies-hackers-can-use-in-terrible-new-ways\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"5 AI Technologies Hackers Can Use in Terrible New Ways"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/40097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=40097"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/40097\/revisions"}],"predecessor-version":[{"id":40099,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/40097\/revisions\/40099"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/40098"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=40097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=40097"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=40097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}