Feeds

MI5 chief: Cyber spying 'relatively straightforward' to beat

Common sense call

Protecting against web application threats using SSL

Jonathan Evans, the head of MI5, has claimed the internet has made the threat of espionage by foreign countries higher than ever before, but insisted it is "relatively straightforward" to block attempts to steal data.

"The overall likelihood of any particular entity being the subject of state espionage has probably never been higher, though paradoxically many of the vulnerabilities exploited both in cyber espionage and traditional espionage are relatively straightforward to plug if you are aware of them," he said.

The common sense call is relevant to ongoing work by the year-old Office of Cyber Security in the Cabinet Office to improve basic information security across government and in businesses.

MI5, officially known as the Security Service, is responsible for counter-espionage. Evans has previously written to the bosses of big British companies to warn them of the threat online, particularly from hackers with links to the Chinese intelligence services.

Cyber security is a key issue for the ongoing Strategic Defence and Security Review, which is due to report next month. Following the first national Cyber Security Strategy last year, efforts to protect UK networks and data are expected to receive a large budget boost, against a background of cuts to other areas of defence and security.

"Cyber security is a priority for the government both in respect of national security and economic harm. Ensuring that well informed advice is available to those who need it, including through the use of private sector partners is, and will remain, vital," Evans said.

He made his comments in a rare public speech last night in the City of London, which focused on threats from dissident Irish Republicans and Islamic extremists in Yemen and Somalia. The intelligence budget is under pressure as part of the Comprehensive Spending Review. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.