Fake News Will Lead To A Cyber War

Fake news - we have all heard about it, but sometimes struggle to grasp the extent of its impact. With the next generation moving to online and social media as the go-to news source, and a good chunk of what is put out on social media being fake, it is left up to the reader to determine whether the information is true or not.  

When people start to believe everything they read, it makes the world a very unpredictable place. With no indicators on the source or truth of the news on social media, many countries, democracies and nation states will struggle with transparency and could become politically unstable.

It only takes one fake news story from a trustworthy source to devalue the entire news feed, forcing us to question what is real and what is not.

To put it bluntly, fake news is a form of cyber attack and will only grow significantly in 2018 and beyond.

Fake News Leads to Cyberwar

Information cyber wars have become a major disruption to our way of life, filling our daily news and feeds with fake information to influence our actions and change the outcome of important and vital decisions.

Rather than focusing on important citizen’s needs, such as taxes, healthcare and education, many governments are now embroiled in trust and transparency challenges caused by the continuous disruption from cyber-attacks.   
 
Many recent cyber incidents have been stealing huge amounts of personal and sensitive information that is then being used to pursue and influence our nation’s decision making.

When a cyber-attack from another nation-state tries to influence our way of life, our society, or the outcome of our democracy, should this be considered an act of war?

Large troll factories and botnet farms are using our stolen personal information to guarantee that our news feeds are filled with fake information that attracts your reaction to respond and participate, creating a growing trend which now circles your friends and family.

This all starts from a machine-controlled bot, which is not to get you to click on a link or install malicious malware, but to get you to share malicious information, influence your friend’s decisions and distrust your own government, creating divide rather than impartiality.      

Nation Ownership of Cyber Attacks Lacking

One thing that is clear is that cyber-attacks are crossing country borders and disrupting our way of life, without nation states taking responsibility.

We hear about cyber-criminal groups that are behind many of the major cyber incidents in recent years whether it was a major data breach, ransomware or government agencies classified data being targeted.  

Several companies and governments have linked these groups to nation states, but without revealing concrete evidence, these nation-states simply deny any involvement.  

Without clear cooperation and transparency, this will continue to grow as a major problem with a possibility of a full-on cyber war as retaliation.
 
Nation Acceptance of Cyber Crimes Causing Disruption

To prevent such a major catastrophe from occurring, governments and nation states need to work together with full cooperation and transparency to ensure that cyber attribution is possible and hold each other responsible for the actions of criminal organisations carrying out cyber-attacks from within their borders. 

It is important that governments do not provide a safe haven for cyber criminals to carry out such attacks, especially when they are doing it for both financial, political gains and extreme aggression.

Trust has become an issue in cyberspace and information wars are in full effect with the clear intention of political and social disruption. This itself should be considered an intent of war using extreme aggression. It is time for governments to act, protect democracy and our way of life.

SecurityInfoWatch:      Image: Nick Yougson

You Might Also Read: 

On Twitter Fake News Gets More Traction Than Truth:

Does Fake News Affect Threat Intelligence?:
          
 

« IBM’s Watson Takes On The IoT
Home Working Is A Threat To Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

ISACA

ISACA

ISACA is a global professional association and learning organization for members who work in information security, governance, assurance, rissk and privacy.

Rewertz

Rewertz

Rewterz is a cyber security company based out of Dubai, serving customers in UAE, Oman, Qatar, Bahrain, Saudi Arabia, and Pakistan.

Center for Long-Term Cybersecurity (CLTC)

Center for Long-Term Cybersecurity (CLTC)

The Center for Long-Term Cybersecurity is developing and shaping cybersecurity research and practice based on a long-term vision of the internet and its future.

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU-ARCC acts as ITU’s cybersecurity hub in the Arab Region localizing and coordinating cybersecurity initiatives.

Aergo

Aergo

Aergo offers an easier and more proven way to adopt blockchain and transform your business while building on your existing IT and cloud assets.

NETRIO

NETRIO

If you are looking for a highly mature, exceptionally competent Managed Service Provider, NETRIO has solutions to keep your business running at warp speed with zero disruptions.

Future Technology Systems Company (FutureTEC)

Future Technology Systems Company (FutureTEC)

FutureTEC is a leading Information Technology Solutions Provider, delivering world-class Information Security, Information Management, and Business Solutions.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Sontiq

Sontiq

Sontiq is committed to providing best-in-class, highly scalable, award-winning identity security solutions to consumers, businesses and government agencies.

LoughTec

LoughTec

LoughTec secure, manage and connect IT infrastructure for businesses and organisations throughout the UK and Republic of Ireland.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

Gatefy

Gatefy

Getfy is a cybersecurity company specialized in artificial intelligence and machine learning. We work to solve challenging issues, especially those involving email security.

Numen Cyber Technology

Numen Cyber Technology

Numen Cyber Technology is committed to becoming a Threat Discovery and Response expert for corporate customers.

Suffescom Solutions

Suffescom Solutions

Suffescom Solutions is a leading blockchain development company, assisting businesses in harnessing the true potential of blockchain technology.

DynTek

DynTek

DynTek delivers exceptional, cost-effective professional IT consulting services, end-to-end IT solutions and managed IT services.