About the Review


Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is a publication designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.


Latest news 


  • Inspector gadget: how smart devices are outsmarting criminals

    June 23, 2017

    Richard Dabate told police a masked intruder assaulted him and killed his wife in their Connecticut home. His wife’s Fitbit told another story and Dabate was charged with the murder. James Bates said an acquaintance accidentally drowned in his hot tub in Arkansas. Detectives suspected foul play and obtained data from Bates’s Amazon Echo device. Bates ...

  • Breach at UK.gov’s Cyber Essentials scheme exposes users to phishing attacks

    June 21, 2017

    The operation behind the UK government’s Cyber Essentials scheme has suffered a breach exposing the email addresses of registered consultancies, it told them today. The scheme’s badges are required by all suppliers bidding for “certain sensitive and personal information-handling contracts”. Companies were notified of the problem, which leaves them at greater risk of phishing attack, through ...

  • Microsoft to Remove SMBv1 Protocol in Next Windows 10 Version (RedStone 3)

    June 20, 2017

    The Server Message Block version 1 (SMBv1) — a 30-year-old file sharing protocol which came to light last month after the devastating WannaCry outbreak — will be removed from the upcoming Windows 10 (1709) Redstone 3 Update. The SMBv1 is one of the internet’s most ancient networking protocols that allows the operating systems and applications to ...

  • FIN10 Extorting Canadian Mining Companies, Casinos

    June 20, 2017

    Cybercriminals targeting casinos and mining firms in North America have extorted as much as $620,000 per theft during a four-year run in which they threaten victims with the destruction or public release of stolen data. Between 2013 and 2016, mostly Canadian firms were hit with nearly a dozen seemingly unrelated hacks, but after an analysis of the ...

  • WebSites Found Collecting Data from Online Forms Even Before You Click Submit

    June 20, 2017

    ‘Do I really need to give this website so much about me?’ That’s exactly what I usually think after filling but before submitting a web form online asking for my personal details to continue. I am sure most of you would either close the whole tab or would edit already typed details (or filled up by browser’s ...

  • Call for investment in NHS cybersecurity

    June 20, 2017

    A “massive” increase in spending is needed to prevent another “avoidable” cyber attack on NHS computer systems, an expert has warned. A ransomware attack hit 11 health boards in Scotland last month, as well as many other organisations worldwide. Prof Bill Buchanan told MSPs the attack should act as a “wake-up call” to the government and health ...

  • Militaries and Industry Seek to Solve Cybersecurity Conundrum

    June 20, 2017

    For at least the whole of the current century, militaries have understood the critical role cyberdefense plays in every aspect of operations. Yet most military organizations appear reluctant to train for network defense outside of specialist cyber units. Unlike with land, sea, air and space, cyberwarfare cannot be conducted only by specialists. Mistakes in configuration or ...

  • Aussie big business CEOs investing more in cyber than global counterparts: KPMG

    June 19, 2017

    Australia’s top chief executives are more concerned about cyber security threats and are spending more money to defend against them than their global counterparts, according to new research from KPMG. Figures extracted from the big four accounting firm’s latest Global CEO Outlook study showed that 71 per cent of Australian business leaders running companies turning over more than $500 ...

  • How to make your employees care about cybersecurity: 10 tips

    June 19, 2017

    Employees are a company’s greatest asset, but also its greatest security risk. “If we look at security breaches over the last five to seven years, it’s pretty clear that people, whether it’s through accidental or intentional introduction of malware, represent the single most important point of failure in terms of security vulnerabilities,” said Eddie Schwartz, chair ...

  • Banks to be forced to reveal all cyber security breaches to the European Central Bank

    June 19, 2017

    All banks regulated by the European Central Bank (ECB) will be forced to reveal all major cyber security breaches, according to one of the supervisor’s bosses. Starting this summer, banks directly supervised by the ECB will have to “report all significant cyber incidents”, said Sabine Lautenschlaeger, a member of the ECB’s executive board. At a speech in ...

  • University College London Suffers Major Ransomware Attack

    June 16, 2017

    The University College London (UCL) has been hit by a major ransomware attack on June 15, with the infection reaching personal and shared drives in the network. UCL admins explained in updates posted on the official website that the infection was most likely possible because of a zero-day, pointing out that antivirus systems failed to detect ...

  • U.S. Government Embraces Automated Cybersecurity

    June 16, 2017

    Agencies in the federal government are working to develop tools and software that would automate cybersecurity – essentially, an effort to remove human error from the equation. A new report out by NextGovdetails the automation effort, and why these tools aren’t yet ready for government-wide deployment. Much of the cybersecurity efforts in government currently, revolve around ...