About the Review

Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is a publication designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.

Latest news 

  • Got Effective Cybersecurity Practices? Be Aware: The FTC Is Watching You

    February 20, 2017

    Following a July ruling against medical testing laboratory LabMD (which is now out of business), the Federal Trade Commission has emerged as a central regulator of cybersecurity practices for U.S. businesses. The FTC’s mandate to act on “unfair or deceptive” business practices that could harm consumers is being interpreted in a way that means any ...

  • States vie for Israeli cyber security investment as CyberGym heads downunder

    February 20, 2017

    State governments are jostling to win a major cyber security investment from the multibillion-dollar Israeli government-owned electricity company, as the business implications of Prime Minister Benjamin Netanyahu’s first Australian visit begin to take shape. Ofer Bloch, chief executive of the Israel Electric Corporation (IEC), was in Australia with the Prime Minister’s accompanying delegation of business leaders ...

  • Malware Hijacks Microphones to Spy On Ukrainian Businesses, Scientists and Media

    February 20, 2017

    Ukraine has once again been a target of a potential hacking attack that infected computer systems from dozens of Ukrainian businesses with highly sophisticated malware, allowing hackers to exfiltrate sensitive data and eavesdrop on their network. Late last year, the country also suffered a power outage caused by the same group of hackers that targeted Ukraine’s ...

  • Siemens Awarded Cyber Security Certificate for Digital Grid Automation Solutions

    February 20, 2017

    Siemens has received a certificate for network automation solutions from TÜV Süd, Munich, Germany, in accordance with the international standards series IEC 62443. The secure substation framework from Siemens has been certified to IEC 62443-2-4 (requirements for system integrators) and IEC 62443-3-3 (requirements for the security functions of systems). The certified architecture is based on ...

  • New TeamSpy Malware Campaign Turns TeamViewer into Spy Tool

    February 20, 2017

    TeamSpy is back and it’s turning TeamViewer into the spying tool that no one wants. According to security firm Heimdal, a new spam campaign emerged over the weekend, carrying the TeamSpy malware which can give hackers full access to a compromised computer. This isn’t a new type of malware whatsoever. In fact, back in 2013, it was ...

  • Study reveals cybersecurity readiness gaps in US oil and gas industry

    February 16, 2017

    A survey of US oil and gas cybersecurity risk managers indicates that the deployment of cybersecurity measures in the industry isn’t keeping pace with the growth of digitalization in oil and gas operations. In a study from the Ponemon Institute – The State of Cybersecurity in the Oil & Gas Industry: United States – just ...

  • Israeli Military Targeted by Android Mobile Surveillance Malware

    February 16, 2017

    According to Kaspersky Lab, starting in mid last year, over 100 Israeli servicemen were hit by an attack that exfiltrated data to the attackers’ command and control servers. Then, the devices were pushed Trojan updates allowing the hackers to extend their capabilities. Experts believe the campaign is still ongoing and in its early stages, targeting Android ...

  • F-Secure buys industrial control security firm

    February 16, 2017

    F-Secure has acquired hardware and embedded system security firm Inverse Path. Financial terms of the deal, announced on Thursday, were undisclosed. Inverse Path provides focus hardware security technology to specialist sectors including automotive, avionics and industrial control, as well as traditional software applications. It sells to both mid-market and Fortune 500 companies. Jens Thonke, executive vice president, ...

  • Government Needs To Take Immediate Actions To Strengthen US Cybersecurity, GAO Says

    February 14, 2017

    Testifying before the House Subcommittee on Research and Technology, Committee on Science, Space and Technology today, Gregory C. Wilshusen, Director, Government Accountability Office (GAO) Information Security Issues, warned GAO “has consistently identified shortcomings in the federal government’s approach to ensuring the security of federal information systems and cyber critical infrastructure, as well as its approach to protecting ...

  • Cybersecurity alliance promoting intel-sharing seeks to expand

    February 14, 2017

    Hackers have probably had a harder time slipping past your security software, thanks to an alliance between some of the top vendors in the industry. The Cyber Threat Alliance, a group of security firms that often compete, says its efforts to share intelligence on the latest hacking threats have been paying off. Rivals including Fortinet, Intel Security, ...

  • Cybersecurity: Queen opens centre to protect against attacks

    February 14, 2017

    The Queen was shown how hackers could target the UK’s electricity supply as she opened a centre to protect the nation from cyber attacks. The National Cyber Security Centre – part of intelligence agency GCHQ – started work in October as part of a £1.9bn five-year strategy. Staff in Victoria, central London, will be joined by experts ...

  • Websites Can Now Track You Online Across Multiple Web Browsers

    February 14, 2017

    You might be aware of websites, banks, retailers, and advertisers tracking your online activities using different Web “fingerprinting” techniques even in incognito/private mode, but now sites can track you anywhere online — even if you switch browsers. A team of researchers has recently developed a cross-browser fingerprinting technique — the first reliable technique to accurately track ...