Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Whats The Risk? 3 Things To Know About Chatbots & Cybersecurity
Newest First  |  Oldest First  |  Threaded View
AshishJ981
AshishJ981,
User Rank: Apprentice
1/19/2018 | 6:26:29 AM
Re: As tech advances, so do threats...

The question also comes that can platforms that integrates with chatbot platforms provide end to end encryption? And if not, then how is this communication channel secure (given that it doesn't have end-to-end encryption. We at Engati www.engati.com have started the journey. Do read our collection of blogs at Engati.com, test our platform and provide us feedback.

edyang
edyang,
User Rank: Apprentice
9/29/2016 | 12:01:59 PM
Re: Criminal
Good point. I bet if you ask the average person what a chatbot is, they'll stare at you blankly...
MikeBaker
MikeBaker,
User Rank: Author
9/28/2016 | 1:50:03 PM
Re: Criminal
That's a good question-

My impression has been that the average consumer isn't even aware of what chat bots are, or that they're in use. Until the awareness increases, criminal chat bots could be the perfect way for for bad actors to programatically split-test out different approaches/questions/scenarios to what's only been used up until now in old-fashioned social engineering based attempts.
Whoopty
Whoopty,
User Rank: Ninja
9/21/2016 | 7:51:38 AM
Criminal
The criminal chat bots is a really interesting idea. I wonder if people will become less concious of their own security when talking to bots, as they will assume they are from a legitimate source?

They may assume that bots are stupid, but I doubt anyone would expect a bot to screw them over. 
EdnaBaron
EdnaBaron,
User Rank: Apprentice
9/21/2016 | 6:25:29 AM
Re: As tech advances, so do threats...
Chatbot technology is one of the highly discussed part and this article describes each and every important points related to this particular area of technology. Cyber security is more important and it plays important role to keep confidential data. 
edyang
edyang,
User Rank: Apprentice
9/19/2016 | 12:44:55 PM
As tech advances, so do threats...
It's an exciting time. Artificial intelligence, machine learning, chatbots, self-driving cars, augmented reality games. But as technology advances, it's a given that there will be cybersecurity threats. The difference will be the magnitude of the impact. What if malware infected chatbots siphoned financial data, or worse social security numbers, from unsuspecting users? What if IoT health care devices were hacked? It's an exciting but also a dangerous time.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-1883
PUBLISHED: 2022-05-25
SQL Injection in GitHub repository camptocamp/terraboard prior to 2.2.0.
CVE-2022-21951
PUBLISHED: 2022-05-25
A Missing Encryption of Sensitive Data vulnerability in SUSE Rancher, Rancher allows attackers on the network to read and change network data due to missing encryption of data transmitted via the network when a cluster is created from an RKE template with the CNI value overridden This issue affects:...
CVE-2022-1815
PUBLISHED: 2022-05-25
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository jgraph/drawio prior to 18.1.2.
CVE-2022-29405
PUBLISHED: 2022-05-25
In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8
CVE-2022-29349
PUBLISHED: 2022-05-25
kkFileView v4.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the url parameter at /controller/OnlinePreviewController.java.