Feeds

Lords to attack UK.gov failings on internet security

Fraud reporting recommendations ignored

5 things you didn’t know about cloud backup

Members of the House of Lords Science and Technology Committee will this Friday call on ministers to do more to battle security threats online.

The House will debate the government's response to the well-regarded personal internet security recommendations produced by the Committee last year. Lords and security experts have criticised the failure to act on many of the recommendations, including making software developers legally liable for vulnerabilities.

Ahead of the new debate crossbench peer Lord Broers, who chaired the Committee's internet security sessions, said:

In our initial report we raised concerns that public confidence in the internet could be undermined if more was not done to prevent and prosecute e-crime. We felt that the Government, the police and the software developers were failing to meet their responsibilities and were quite unreasonably leaving individual users to fend for themselves.

Some of our recommendations, such as the establishment of a specialist e-crime police unit, are now being acted on by Government. But others, such as software developers' liability for damage caused by security flaws and enabling people to report online fraud directly to the police rather than their bank, have either been ignored or are awaiting action.

In our follow-up report we committed ourselves to keep an ongoing watch on developments in internet security and to press the Government to do more to ensure that confidence in the internet is maintained. This debate will enable members of the House to question the Government on what has been achieved and will allow members of the Committee to reassert their calls for better protection for internet users.

Last week the government finally approved a new dedicated e-crime police force to replace the National Hi-Tech Crime Squad, which was shut down in 2006. Concerns about the new unit's remit are likely to figure in Friday's debate.

The Committee's first report from August 2007 and the follow-up in July this year will also be up for discussion in the Lords from 12pm on October 10, and will be webcast live here. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
JLaw, Kate Upton exposed in celeb nude pics hack
100 women victimised as Apple iCloud accounts reportedly popped
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.