Fake News Will Lead To A Cyber War

Fake news - we have all heard about it, but sometimes struggle to grasp the extent of its impact. With the next generation moving to online and social media as the go-to news source, and a good chunk of what is put out on social media being fake, it is left up to the reader to determine whether the information is true or not.  

When people start to believe everything they read, it makes the world a very unpredictable place. With no indicators on the source or truth of the news on social media, many countries, democracies and nation states will struggle with transparency and could become politically unstable.

It only takes one fake news story from a trustworthy source to devalue the entire news feed, forcing us to question what is real and what is not.

To put it bluntly, fake news is a form of cyber attack and will only grow significantly in 2018 and beyond.

Fake News Leads to Cyberwar

Information cyber wars have become a major disruption to our way of life, filling our daily news and feeds with fake information to influence our actions and change the outcome of important and vital decisions.

Rather than focusing on important citizen’s needs, such as taxes, healthcare and education, many governments are now embroiled in trust and transparency challenges caused by the continuous disruption from cyber-attacks.   
 
Many recent cyber incidents have been stealing huge amounts of personal and sensitive information that is then being used to pursue and influence our nation’s decision making.

When a cyber-attack from another nation-state tries to influence our way of life, our society, or the outcome of our democracy, should this be considered an act of war?

Large troll factories and botnet farms are using our stolen personal information to guarantee that our news feeds are filled with fake information that attracts your reaction to respond and participate, creating a growing trend which now circles your friends and family.

This all starts from a machine-controlled bot, which is not to get you to click on a link or install malicious malware, but to get you to share malicious information, influence your friend’s decisions and distrust your own government, creating divide rather than impartiality.      

Nation Ownership of Cyber Attacks Lacking

One thing that is clear is that cyber-attacks are crossing country borders and disrupting our way of life, without nation states taking responsibility.

We hear about cyber-criminal groups that are behind many of the major cyber incidents in recent years whether it was a major data breach, ransomware or government agencies classified data being targeted.  

Several companies and governments have linked these groups to nation states, but without revealing concrete evidence, these nation-states simply deny any involvement.  

Without clear cooperation and transparency, this will continue to grow as a major problem with a possibility of a full-on cyber war as retaliation.
 
Nation Acceptance of Cyber Crimes Causing Disruption

To prevent such a major catastrophe from occurring, governments and nation states need to work together with full cooperation and transparency to ensure that cyber attribution is possible and hold each other responsible for the actions of criminal organisations carrying out cyber-attacks from within their borders. 

It is important that governments do not provide a safe haven for cyber criminals to carry out such attacks, especially when they are doing it for both financial, political gains and extreme aggression.

Trust has become an issue in cyberspace and information wars are in full effect with the clear intention of political and social disruption. This itself should be considered an intent of war using extreme aggression. It is time for governments to act, protect democracy and our way of life.

SecurityInfoWatch:      Image: Nick Yougson

You Might Also Read: 

On Twitter Fake News Gets More Traction Than Truth:

Does Fake News Affect Threat Intelligence?:
          
 

« IBM’s Watson Takes On The IoT
Home Working Is A Threat To Cybersecurity »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Infinigate UK

Infinigate UK

Infinigate is a value-added distributor of IT security solutions to protect and defend IT networks, servers, devices, data, applications, as well as the cloud.

Global Knowledge Training

Global Knowledge Training

Global Knowledge is a worldwide leader in IT and business training, featuring Cisco, Microsoft, VMware, IBM, security, cloud computing, and project management.

Norwegian Information Security laboratory (NISlab)

Norwegian Information Security laboratory (NISlab)

NISlab conducts international competitive research in information and cyber security and operates study programs in this area.

SQNetworks

SQNetworks

SQNetworks provides a full range of cybersecurity consultancy, services and solutions.

G DATA CyberDefense

G DATA CyberDefense

G Data developed the world's first antivirus software. We now ensure the security of small, large and medium-sized companies all over the world.

Computer Forensics Consult (CFC)

Computer Forensics Consult (CFC)

Computer Forensics Consult provides disaster recovery, computer forensics, electronic discovery and litigation support services in the growing area of Cyber Security.

Culinda

Culinda

Culinda secures medical IoT devices in hospitals with An Artificial Intelligence platform and security gateway.

CYE

CYE

Utilizing data, numbers, and facts, CYE helps security leaders know what business assets are at risk and execute cost-effective remediation projects for optimal risk prevention.

Leadcomm

Leadcomm

Leadcomm is a Brazilian company focused on the distribution and integration of IT systems and security solutions for large companies.

Arc4dia Labs

Arc4dia Labs

Arc4dia have developed SNOW, a cyber security solution to combat the world’s most sophisticated cyber threats.

Forum of Incident Response & Security Teams (FIRST)

Forum of Incident Response & Security Teams (FIRST)

FIRST is the global Forum of Incident Response and Security Teams.

Euro-Recycling

Euro-Recycling

Euro-Recycling is a leading UK provider of Secure On-Site Data Media Destruction Services.

DCX Technology

DCX Technology

Recognized as a leader in security services, DXC Technology help clients prevent potential attack pathways, reduce cyber risk and improve threat detection and incident response.

BullGuard

BullGuard

BullGuard is an award-winning cybersecurity company focused on providing the consumer and small business markets with the confidence to use the internet in absolute safety.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

Blockaid

Blockaid

Blockaid is the onchain security platform for monitoring, detecting, and responding to onchain and offchain threats.