KI und Cyber-Attacken – Die Gefahr ist nah
Die nächste große Cyber-Attacke könnte von künstlicher Intelligenz ausgehen. Es könnte sogar sehr früh passieren. Auf einer Cyber-Sicherheits Konferenz, die erst kürzlich stattfand, gaben 62 aus den 100 befragten Branchenexperten an, dass die nächste KI modifizierte Cyber-Attacke in den nächsten zwölf Monaten stattfinden könnte. Das heißt nicht, dass von nun[...] [...]
Read More » 






![Internetsicherheit (adapted) (Image by Pete Linforth [CC0 Public Domain] via Pixabay)](https://www.netzpiloten.de/wp-content/uploads/2017/02/Internetsicherheit-adapted-Image-by-Pete-Linforth-CC0-Public-Domain-via-Pixabay-500x350.png)

![daten(image by myrfa[CC0 Public Domain] via Pixabay)](https://www.netzpiloten.de/wp-content/uploads/2016/10/daten-500x350.jpg)
![binary (image by geralt [CC0 Public Domain] via Pixabay)](https://www.netzpiloten.de/wp-content/uploads/2016/08/binary-image-by-geralt-CC0-Public-Domain-via-Pixabay-500x350.png)
![GOJI Smart Lock (adapted) (Image by Maurizio Pesce [CC BY 2.0] via flickr)](https://www.netzpiloten.de/wp-content/uploads/2016/09/GOJI-Smart-Lock-adapted-Image-by-Maurizio-Pesce-CC-BY-2.0-via-flickr-500x350.png)
![Binary code (adapted) (Image by Christiaan Colen [CC BY-SA 2.0] via flickr)](https://www.netzpiloten.de/wp-content/uploads/2016/08/Binary-code-adapted-Image-by-Christiaan-Colen-CC-BY-SA-2.0-via-flickr-500x350.jpg)
![Tastatur Esc (Image by Silvia Stoedter [CC0_Public Domain], via Pixabay)](https://www.netzpiloten.de/wp-content/uploads/2016/07/Tastatur-Esc-Image-by-Silvia-Stoedter-CC0_Public-Domain-via-Pixabay-500x350.jpg)
![Cyber attacks (adapted) (Image by Christiaan Colen [CC BY-SA 2.0] via flickr)](https://www.netzpiloten.de/wp-content/uploads/2016/05/Cyber-attacks-adapted-Image-by-Christiaan-Colen-CC-BY-SA-2.0-via-flickr-500x350.jpg)
![The Apple - FBI Electronic Encryption Fight RGB Triptych v1.3 (adapted) (Image by Surian Soosay Folgen [CC BY 2.0] via flickr)](https://www.netzpiloten.de/wp-content/uploads/2016/04/The-Apple-FBI-Electronic-Encryption-Fight-RGB-Triptych-v1.3-adapted-Image-by-Surian-Soosay-Folgen-CC-BY-2.0-via-flickr-500x350.jpg)
![Pfeife Metall (Image: Hans [CC0 Public Domain], via Pixabay](https://www.netzpiloten.de/wp-content/uploads/2016/04/Pfeife-Metall-Image-Hans-CC0-Public-Domain-via-Pixabay-500x350.jpg)
![Anonymous (adapted) (Image by Alf Melin [CC BY-SA 2.0] via Flickr)](https://www.netzpiloten.de/wp-content/uploads/2016/04/Anonymous-adapted-Image-by-Alf-Melin-CC-BY-SA-2.0-via-Flickr-500x350.jpg)
![We love Internet (adapted) (Image by Kristina Alexanderson [CC BY 2.0] via Flickr)](https://www.netzpiloten.de/wp-content/uploads/2016/04/We-love-Internet-adapted-Image-by-Kristina-Alexanderson-CC-BY-2.0-via-Flickr-500x350.jpg)