Feeds

Lords to attack UK.gov failings on internet security

Fraud reporting recommendations ignored

Internet Security Threat Report 2014

Members of the House of Lords Science and Technology Committee will this Friday call on ministers to do more to battle security threats online.

The House will debate the government's response to the well-regarded personal internet security recommendations produced by the Committee last year. Lords and security experts have criticised the failure to act on many of the recommendations, including making software developers legally liable for vulnerabilities.

Ahead of the new debate crossbench peer Lord Broers, who chaired the Committee's internet security sessions, said:

In our initial report we raised concerns that public confidence in the internet could be undermined if more was not done to prevent and prosecute e-crime. We felt that the Government, the police and the software developers were failing to meet their responsibilities and were quite unreasonably leaving individual users to fend for themselves.

Some of our recommendations, such as the establishment of a specialist e-crime police unit, are now being acted on by Government. But others, such as software developers' liability for damage caused by security flaws and enabling people to report online fraud directly to the police rather than their bank, have either been ignored or are awaiting action.

In our follow-up report we committed ourselves to keep an ongoing watch on developments in internet security and to press the Government to do more to ensure that confidence in the internet is maintained. This debate will enable members of the House to question the Government on what has been achieved and will allow members of the Committee to reassert their calls for better protection for internet users.

Last week the government finally approved a new dedicated e-crime police force to replace the National Hi-Tech Crime Squad, which was shut down in 2006. Concerns about the new unit's remit are likely to figure in Friday's debate.

The Committee's first report from August 2007 and the follow-up in July this year will also be up for discussion in the Lords from 12pm on October 10, and will be webcast live here. ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.