• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  News  /  What are intra-state cyber threats and how to handle them?
28 January 2019

What are intra-state cyber threats and how to handle them?

Written by Sanjay Katkar
Sanjay Katkar
News
  • 8K
    Shares
Estimated reading time: 3 minutes

In the new information age we live in, cyber threats represent an ever-growing and dangerous form of intimidation and pressure. These threats represent a new tool of warfare and seek to reap chaos and distrust. While much attention is focused on different nation-states utilizing cyber warfare against enemy nation-states, we often forget that the danger may not always be external.

Cyber threats are not an issue only when it comes from an external source. While enemy nations may try and influence opinion through this channel, countries often have to face intra-state threats within their own territories. These can be in the form of:

Dissemination of fake news

Fake news is a huge problem facing almost every major country. A study by Oxford University found evidence of formally organized social media manipulation campaigns in 48 countries in 2018, up from 28 from a similar study in 2017. In countries like India, this problem is acute and has often been linked to violence.

Large scale misinformation campaigns are organized by parties to score brownie points against each other. Fake news is created and freely distributed, especially among WhatsApp, with thousands of people forwarding the news to each other, creating an ecosystem of false information.

Analyzing the kind of fake news that is being disseminated can show that there is a pattern. Political parties disseminate news or information which tries to portray their own party in good light and other parties in a bad light in the form of morphed videos, photos or out of context audio clips.

Political rivalries

In democracies, winning elections is key. And to win elections, you need to influence the voting populace. With the influence of low-cost Internet, social media has become a new battleground for parties.

Parties run concerted campaigns on social media to vilify each other and at times, even launch attacks against each other. They employ bots as well on social media to amplify their messages and reach a larger audience, all in the hope of winning an election. The collateral damage is that the atmosphere becomes vitiated and polarized, giving rise to violence and a lack of civility in discourse.

Exploiting social media

Nowadays, a common complaint about social media channels is how it has been taken over by political parties. Social media as a whole, as mentioned in the last point, has become a battleground. Parties now spend huge amounts of money and employ a large number of people to control the narrative on social media.

It is important not to get sucked into this fake news vortex and keep the head above the water. Remember, fake news thrives on emotion, so maintain your logical senses. Some tips to combat fake news are:

  • Do not believe anything you receive or see on social media. Check it from different sources, especially good ones, and only then make up your mind on it.
  • On no account, should you forward a message you receive which talks about a piece of information you are not sure of.
  • If you find accounts propagating fake news, report them immediately using the options provided on social media.
  • Do not trust any information because it ties in with your own views and opinions. Keep your logic intact and ensure that you don’t get trapped into the fake news ecosystem.

Seqrite is the enterprise security brand of Quick Heal Technologies Ltd., which offers
world-class enterprise cybersecurity solutions.

This is the second article in the #SeqriteonElectionSecurity series. Watch this space to get more updates on protection of elections, citizens, and voting infrastructure from cyberattacks or cyber threats.

Also read: What kind of cyber threats loom over elections?

 Previous PostGandCrab Ransomware along with Monero Miner and Spammer
Next Post  This is how hackers can invade your system without installing mal...
Sanjay Katkar
About Sanjay Katkar

Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of Quick Heal Technologies Limited. He holds a Masters in Computer Science from University...

Articles by Sanjay Katkar »

Related Posts

  • Cybersecurity roundup – Jan to April ‘19

    May 22, 2019
  • Cybersecurity Predictions for 2019

    February 22, 2019
  • social media

    How are social networking accounts used for malicious purposes?

    February 18, 2019

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond Turn the Page: Cybersecurity Predictions for 2021 & beyond February 18, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.