Theresa May 'bans Apple Watch from UK cabinet meetings'

Does the PM see smartwatches as a cybersecurity threat?

The UK's new Prime Minister, Theresa May, appears to have banned smartwatches from official cabinet meetings, on the grounds that foreign governments could hack them and listen in on political conversations.

"The Russians are trying to hack everything," an anonymous inside source told the Telegraph, which broke the story.

IT Pro contacted Number 10's press office, which declined to comment.

Smartwatches like the Apple Watch were allowed in David Cameron's cabinet meetings during his tenure as PM, and caused hilarity last year, when Michael Gove accidentally pressed play on a Beyonc track.

Advertisement
Advertisement - Article continues below

However, they now join the list of electronic gadgets banned from cabinet use, which also includes smartphones and tablets, banned in late 2013.

The worldwide political climate has become tenser in regards to cyber security, following several incidents attributed to nation state hackers.

A leak of 19,000 emails from the Democratic National Committee (DNC) and Democratic Congressional Campaign Committee (DCCC) occurred in July, which Homeland Security today blamed on Russia.

Last year, the German government accused the NSA and GCHQ of spying on Angela Merkel and other German officials through the use of malware called Regin. This malware, which was said to be one of the most advanced malicious software ever exposed, was found on the laptop of one of Germany's high-ranked leaders.

Smartwatches have also been banned in Australian cabinet meetings, after Alastair MacGibbon, Australian Prime Minister Malcolm Turnbull's cyber advisor, said as they could be a potential risk to national security.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Recommended

Visit/government-it-strategy/28305/ir35-news
Policy & legislation

Opposition parties pledge to scrap private sector IR35 rules

29 Nov 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/hardware/354232/raspberry-pi-4-owners-complain-of-broken-wi-fi-when-using-hdmi
Hardware

Raspberry Pi 4 owners complain of broken Wi-Fi when using HDMI

29 Nov 2019
Visit/cloud/amazon-web-services-aws/354223/what-to-expect-from-aws-reinvent-2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019