Fake News Will Lead To A Cyber War

Fake news - we have all heard about it, but sometimes struggle to grasp the extent of its impact. With the next generation moving to online and social media as the go-to news source, and a good chunk of what is put out on social media being fake, it is left up to the reader to determine whether the information is true or not.  

When people start to believe everything they read, it makes the world a very unpredictable place. With no indicators on the source or truth of the news on social media, many countries, democracies and nation states will struggle with transparency and could become politically unstable.

It only takes one fake news story from a trustworthy source to devalue the entire news feed, forcing us to question what is real and what is not.

To put it bluntly, fake news is a form of cyber attack and will only grow significantly in 2018 and beyond.

Fake News Leads to Cyberwar

Information cyber wars have become a major disruption to our way of life, filling our daily news and feeds with fake information to influence our actions and change the outcome of important and vital decisions.

Rather than focusing on important citizen’s needs, such as taxes, healthcare and education, many governments are now embroiled in trust and transparency challenges caused by the continuous disruption from cyber-attacks.   
 
Many recent cyber incidents have been stealing huge amounts of personal and sensitive information that is then being used to pursue and influence our nation’s decision making.

When a cyber-attack from another nation-state tries to influence our way of life, our society, or the outcome of our democracy, should this be considered an act of war?

Large troll factories and botnet farms are using our stolen personal information to guarantee that our news feeds are filled with fake information that attracts your reaction to respond and participate, creating a growing trend which now circles your friends and family.

This all starts from a machine-controlled bot, which is not to get you to click on a link or install malicious malware, but to get you to share malicious information, influence your friend’s decisions and distrust your own government, creating divide rather than impartiality.      

Nation Ownership of Cyber Attacks Lacking

One thing that is clear is that cyber-attacks are crossing country borders and disrupting our way of life, without nation states taking responsibility.

We hear about cyber-criminal groups that are behind many of the major cyber incidents in recent years whether it was a major data breach, ransomware or government agencies classified data being targeted.  

Several companies and governments have linked these groups to nation states, but without revealing concrete evidence, these nation-states simply deny any involvement.  

Without clear cooperation and transparency, this will continue to grow as a major problem with a possibility of a full-on cyber war as retaliation.
 
Nation Acceptance of Cyber Crimes Causing Disruption

To prevent such a major catastrophe from occurring, governments and nation states need to work together with full cooperation and transparency to ensure that cyber attribution is possible and hold each other responsible for the actions of criminal organisations carrying out cyber-attacks from within their borders. 

It is important that governments do not provide a safe haven for cyber criminals to carry out such attacks, especially when they are doing it for both financial, political gains and extreme aggression.

Trust has become an issue in cyberspace and information wars are in full effect with the clear intention of political and social disruption. This itself should be considered an intent of war using extreme aggression. It is time for governments to act, protect democracy and our way of life.

SecurityInfoWatch:      Image: Nick Yougson

You Might Also Read: 

On Twitter Fake News Gets More Traction Than Truth:

Does Fake News Affect Threat Intelligence?:
          
 

« IBM’s Watson Takes On The IoT
Home Working Is A Threat To Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

National Crime Agency (NCA)

National Crime Agency (NCA)

The NCA's Cyber Crime Unit focuses on critical cyber incidents in the UK as well as longer-term activity against the criminals and the services on which they depend.

IntaForensics

IntaForensics

IntaForensics offer a full range of digital investigation services and are able to adapt to the individual needs of solicitors, private clients, Law Enforcement Agencies and commercial businesses.

Alarum Technologies

Alarum Technologies

Alarum Technologies (formerly Safe-T) is a global provider of cyber security and privacy solutions to consumers and enterprises.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

Nation-E

Nation-E

Nation-E offers innovative cyber security solutions for industrial installations, critical infrastructure and smart grids.

SlashNext

SlashNext

The SlashNext Internet Access Protection System (IAPS) provides Zero-Day protection against all internet access threats including Social Engineering & Phishing, Malware, Exploits and Callback Attacks.

Exatel

Exatel

Exatel is Poland’s leading provider of ICT security services.

Digital Resolve

Digital Resolve

Digital Resolve delivers solutions that help companies maintain trust and confidence through proven and cost-effective fraud-protection and identity intelligence technology.

Arctic Wolf Networks

Arctic Wolf Networks

Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity.

SyferLock Technology Corp.

SyferLock Technology Corp.

SyferLock is an innovative provider of next-generation authentication and security solutions.

eCentre@LindenPointe

eCentre@LindenPointe

The eCenter@LindenPointe provides assistance to the development, management and promotion of STEM (Science, Technology, Engineering, Mathematics) related business ventures.

Cufflink

Cufflink

Cufflink makes your business more secure, compliant and trusted. We limit the likelihood and impact of a data breach by controlling exactly what can and can't be done with personal data.

Telesystem

Telesystem

Telesystem empowers businesses across the USA with a range of innovative network, communication and collaboration solutions.

VENZA

VENZA

VENZA is a data protection company that can help organisations mitigate their vulnerabilities and ensure compliance, keeping guests and their data safe from breaches.

Mediatech

Mediatech

Mediatech, specialized in managed Cybersecurity and Cloud services, a single point of contact for your company's IT and infrastructure.

AuthX

AuthX

AuthX provides secure and seamless log-in capabilities through strong authentication and integrations.