Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Hacktivism in the Ukraine war could have ‘unintended consequences’, say security analysts

admin by admin
Dec 26, 2022
in Hacktivism
A A
0



For you

Be part of something bigger, join the Chartered Institute for IT.


Lisa Forte, a partner at Red Goat Cyber Security and co-founder of Respect in Security, said: “Cyber security, information security that’s what we think about, we live and breathe it. Those are the threats that we focus on. What really struck me in the last couple of weeks is we’re seeing this humanitarian crisis unfold, and these factors are relatively unimportant, in comparison to the scenes that we’re seeing.”

So why haven’t we seen a significant rise in cyber warfare? Alexi Drew, a senior defence and security analyst at Rand Europe, said: “Why use an alternative means of getting what kinetic (physical attacks) can get? Why turn off a power plant with a wiper when you can just blow up the power plant because you’re already there? Why double up the resources? If you don’t think you need it, there’s no point.”

Fake news

Deepfakes, those images where it can be hard to tell if they are real or not, are already here, said Alexi, who has specialised in disinformation: “The problem of believable faked media is here now. It is not a 2025 issue.

“Deepfake technology doesn’t have to produce high-quality imagery, video, audio or texts. It just needs to be good enough. For example, most footage we get out of conflict zones isn’t filmed on a 4k camera.” She added they are filmed in a rush on a mobile phone by amateurs: “It’s much easier to create believable fake footage on already poor-quality material that’s been around for quite some time and already used in disinformation campaigns.”

Lisa said there’s also the issue of genuine footage could be discredited: “I think the other danger that doesn’t get discussed is that it gives deniability to genuine photographs that haven’t been Photoshopped. You can cast doubt on something that’s factually correct, which is also, in my opinion, equally dangerous.”

Dan Card, a cyber security consultant at PwnDefend echoed Lisa and Alexi’s sentiments: “The information warfare aspect to this, the propaganda, the misrepresentation, the use of fake materials – laughably so with some of the stuff. There is a psychological impact. I’m talking to people all over the world, and you can see them not understanding what the truth is.”

What is truth?

The panel agreed that more education was needed to help people distinguish real from fake.  Dan said: ‘It [the fake] doesn’t need to be good. It just needs to have enough people who aren’t critical thinkers, looking at it.

“The technology community, at least I can speak for areas I surf around in, naturally rips something apart. If it’s not a graph with some science, we’re pretty sceptical. But that’s so not normal.”

The session attended by 100 professionals was the first of two policy webinars on cyber security scheduled by BCS.   



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.