The next world war could feature cyber attacks, but not in the way that most people assume, according to the Symantec EMEA CTO Greg Day.
Many believe sophisticated cyber attacks by one nation state on another could trigger the next world war, but Day believes that cyber tools may be used in different ways.
"Will the next war be a cyber war? [Cyber tools] could be used a lot in terms of propaganda, disinformation and almost the pre-emptor to the physical element," Day told Computing.
"There are already a number of nations that have declared that they are building cyber offensive capabilities and I've done work with a number of different governments where we look at a wide range of issues within their cyber strategy from the defence capability onwards. You can see the UK, France, Germany, the US, Israel and other countries putting cyber on top of their defence strategy. The question is, is it defensive or offensive? And what are they trying to achieve, is it industrial espionage?" he added.
Day emphasised that it was not in Symantec or any other vendors' remit to unearth who the perpetrators of cyber espionage were, but rather to mitigate the risk for their customers.
Last month, US security firm Mandiant released a report citing an secret branch of China's People's Liberation Army (PLA), dubbed unit 61398, as the source of a campaign of espionage against 141 corporations in 20 industries in the US. It alleged that the unit had an uncanny likeness to another cyber group called APT1, which had originally been blamed for the attacks.
"In seeking to identify the organisation behind this activity, our research found that People's Liberation Army unit 61398 is similar to APT1 in its mission, capabilities, and resources," Mandiant said in its report.
"PLA unit 61398 is also located in precisely the same area from which APT1 activity appears to originate".
[Turn to page 2]
The bug could allow unauthenticated attackers to steal sensitive information from vulnerable devices
The first reports of VHD ransomware had appeared in March this year
Chinese app seen as a potential security risk
Post Quantum's Classic McEliece algorithm is the only remaining contender in the code-based category of algorithms designed to protect communications from attacks using quantum computers
Experimental honeypot set up by researchers reveals locations where most of the attacks come from