July 14, 2015 By Shane Schick 2 min read

Google has been using artificial intelligence to teach cars to drive themselves, to recognize human speech and to mimic the way we see. But is artificial intelligence really smart enough to help us get rid of spam?

In a post on the Official Gmail blog, the company said it already has a low spam rate of less than 0.1 percent, in part thanks to the way users train its system by labeling messages as spam or not spam. More recently, however, Google started using an artificial neural network — a kind of software that mimics the way the human brain learns — to filter out certain kinds of messages. This could include phishing emails and other communications that try to dupe victims into clicking through to malware or sites that could take over their machine and harvest their data.

As ZDNet and others pointed out, Google has yet to offer any hard numbers on the volume of phishing emails it has managed to block. Unless users reported failed attempts using such spam, it might be difficult to do so. However, even noticing trends in emails that try to impersonate an individual or an organization such as a bank would be a huge boon for many consumers targeted by cybercriminals.

Of course, even without an artificial neural network, there is data that could help Google and other companies better protect users from the most harmful forms of spam. A story on eWEEK cited a study that showed senders of unsolicited emails largely come from the U.S., Europe and China. It would be interesting to know to what extent Gmail’s machine learning features are integrating third-party research to boost security even further.

Another way to fight back against attackers using email is to improve the way legitimate organizations send messages to customers and prospects. This comes in the form of Gmail Postmaster Tools, which VentureBeat described as a way for enterprises to analyze the results of their email campaigns and ensure what they send isn’t treated as spam.

If all this works, expect more pressure on other organizations to beef up the way they allow messages to move across their platforms. In fact, Wired noted how Facebook has been using machine learning for similar purposes, while Twitter and even Chinese search engine Baidu are following suit. Malicious spammers may finally start getting the message.

More from

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

How red teaming helps safeguard the infrastructure behind AI models

4 min read - Artificial intelligence (AI) is now squarely on the frontlines of information security. However, as is often the case when the pace of technological innovation is very rapid, security often ends up being a secondary consideration. This is increasingly evident from the ad-hoc nature of many implementations, where organizations lack a clear strategy for responsible AI use.Attack surfaces aren’t just expanding due to risks and vulnerabilities in AI models themselves but also in the underlying infrastructure that supports them. Many foundation…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today