About the Review


Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is a publication designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.


Latest news 


  • Old-School DDoS Attack on White House Site Planned on Trump’s Inauguration Day

    January 18, 2017

    A new online campaign that’s making the rounds these days calls for users to “occupy whitehouse.gov on inauguration day” as a form of protest against Donald Trump’s presidency. Published on Protester.io, the protest is basically a call for an old-school DDoS attack that would render the White House website completely useless due to overloading with too ...

  • Mirai botnet creator unmasked as DDOS protection developer tempted by the dark side

    January 18, 2017

    Mirai, the botnet that subverted thousands of poorly secured internet of things devices and set them to work on denial of service attacks, has been revealed to be the creation of a young developer who found that the black hat fit better than the white. This long and fascinating investigation by Brian Krebs, the security researcher ...

  • Router Vulnerabilities Disclosed in July Remain Unpatched

    January 17, 2017

    Details on serious vulnerabilities in a number of routers freely distributed by a major Thai ISP were published on Monday after private disclosures made to the vendors in July went unanswered. Researcher Pedro Ribeiro of Agile Information Security found accessible admin accounts and command injection vulnerabilities in ZyXel and Billion routers distributed by TrueOnline, Thailand’s largest ...

  • Court Documents Reveal How Feds Spied On Connected Cars For 15 Years

    January 16, 2017

    It’s not always necessary to break into your computer or smartphone to spy on you. Today all are day-to-day devices are becoming more connected to networks than ever to add convenience and ease to daily activities. But here’s what we forget: These connected devices can be turned against us because we are giving companies, hackers, and ...

  • White House Approves New Rules for Sharing of Raw Intelligence Data

    January 16, 2017

    President Obama last week approved a change in the way the National Security Agency shares raw signals intelligence data with the rest of the U.S. intelligence community, a shift that privacy experts worry will erode the civil liberties of Americans. An unclassified document released by the Office of the Director of National Intelligence spells out how ...

  • Countering Global Threats: Security & Counter Terror Expo returns to London in May bringing security professionals from across the world to the UK

    January 16, 2017

    Following the Bastille Day attack in Nice and the series of bomb attacks in New York and New Jersey, national security remains in the spotlight. Factor in high profile events such as recent shopping centre shootings across the US, and it’s clear those tasked with protecting nations, assets and people face a multitude of threats. In ...

  • Former head of the Met’s Counter Terrorism Command joins Security & Counter Terror Expo team

    January 16, 2017

    Richard Walton, the former Commander of Counter Terrorism Command (SO15) for the Metropolitan Police Service has joined the Security & Counter Terror Expo team as a special advisor. Mr Walton has extensive knowledge and is recognised as a global expert on counter terrorism During his career he had responsibility for counter-terrorism policing during the Queen’s Diamond ...

  • Court Documents Reveal How Feds Spied On Connected Cars For 15 Years

    January 16, 2017

    It’s not always necessary to break into your computer or smartphone to spy on you. Today all are day-to-day devices are becoming more connected to networks than ever to add convenience and ease to daily activities. But here’s what we forget: These connected devices can be turned against us because we are giving companies, hackers, and ...

  • Secret details emerge on Iran’s Cyber Army

    January 15, 2017

    A report by Al Arabiya has revealed the secrets of the Iranian electronic army and its intelligence and cyber activities against states and institutions. It also examines the details behind the murder of Mohammad Hussein Tajik, its former commander. Tajik was sacked from his post, detained and tortured over accusations of spying and leaking information to the ...

  • Smaller firms set to ‘face £52bn in fines’ for security breaches as cyber-crime skyrockets

    January 14, 2017

    British firms were each subjected to an average of almost 230,000 cyber attacks in 2016, according to analysis from business internet service provider Beaming. The average volume of attacks hitting individual company firewalls passed the 1,000 per day mark for the first time in November. Meanwhile, the Payment Card Industry Security Standards Council suggested that UK firms ...

  • When Cybersecurity Meets Physical Security

    January 13, 2017

    In a recent interview with CNN, the Director of the Secret Service noted that his organization is increasingly focusing on the cyber security of the physical facilities visited by the President of the United States as part of its duty to protect him. This raises the fascinating question of just how much cybersecurity will become ...

  • What’s Up With the WhatsApp ‘Backdoor’ Story? Feature or Bug!

    January 13, 2017

    By definition: “Backdoor is a feature or defect of a computer system that allows surreptitious unauthorized access to data, ” either the backdoor is in encryption algorithm, a server or in an implementation, and doesn’t matter whether it has previously been used or not. Yesterday, we published a story based on findings reported by security researcher ...