All the latest UK technology news, reviews and analysis


UK Cyber Security Strategy: One year on, country on track to be Flame-proof

20 Dec 2012
V3 reporter Alastair Stevenson photo

Every year we get fresh reports that the cyber threat the world faces is growing. The same is true in 2012, with security vendors, industry and even the government detecting an exponential growth in the number and complexity of attacks targeting Britain.

The discovery of new sophisticated, potentially state-sponsored, malware like Flame and Gauss is a common element in these warnings, with pretty much everyone citing their existences as proof the cyber threat facing Britain is growing.

Flame was one of several new advanced malware variants discovered targeting Iranian systems this year. The cyber espionage tool was the first malware to successfully be able to replicate Microsoft update certificates, allowing it to spread across Windows systems faster than most other attacks.

The malware's advanced capabilities stirred the security community to action, with Lockheed Martin, RSA, Bluecoat Systems, the Jericho Forum, F-Secure and Microsoft all listing Flame as a game changer in the threat landscape.

A common fear among all the companies was what would happen if a Flame or Stuxnet-level attack was to successfully target a critical infrastructure industry, with many highlighting how such an attack could quite literally make things go nuclear.

For this reason, when the UK government claimed that its year-old Cyber Security Strategy had already taken appropriate measures to protect itself from such malware earlier in December, we were left more than a little sceptical.

This is because, when the UK government and its agencies unveiled the country's new Cyber Security Strategy in November last year, the strategy mainly focused on combating cyber crime, not state-sponsored threats.

 

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson
About

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Poll

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?
22%
13%
4%
22%
28%
11%

Popular Threads

Powered by Disqus
Sony Xperia Z2 Tablet powered by Android KitKat 4.4

Sony Xperia Z2 Tablet video

We take a look at the lightweight, waterproof tablet

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv33

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery

rdc2

iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Senior Full Stack Development Engineer – Global Tech Company – London

An experienced full stack development engineer is required...

Senior Javascript Engineer – Market Leading Product - London

Experienced Javascript engineer is required to take on...

Software Development Engineer

Develop: Customise: Configure. Maximise your technical...

SAP Programme Manager

SAP Programme Manager Experienced SAP Programme Manager...
To send to more than one email address, simply separate each address with a comma.