About the Review

Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.

Latest news 

  • Korea, US to Begin Joint Investment in and Research on Cyber Security in Late May

    May 22, 2017

    Threats of More intelligent worldwide cyber attacks of these days are strengthening cyber security alliance between Korea and the United States.  According to the Korean Ministry of Science, ICT and Future Planning, the Korean government and the US government (Air Force Research Laboratory) will finalize the selection of a research consortium for the start of joint ...

  • Yahoo Retires ImageMagick After Exploit Leaks Email Content

    May 22, 2017

    Yahoo is once more at the center of a security scandal after an ImageMagick library exploit was found leaking user email content. The discovery was made by security researcher Chris Evans, who demonstrated the exploit, showing just how easy it was to break Yahoo’s system to trigger email information leaks. Yahoo has since retired the use of ...

  • WannaCry: A new era of cyber security

    May 20, 2017

    When the “WannaCry” virus hit computers in at least 150 countries around the world, some called it the beginning of a new era – an era in which hackers have become experts at finding weak spots in our online security. There was also a kind of dawning realisation of how vulnerable organisations all over the globe ...

  • Russian mobile telecom giant MegaFon down in Moscow & other cities

    May 19, 2017

    One of Russia’s three largest cellphone operators, MegaFon, has faced network troubles on Friday, according to comments from clients on social networks. Service has been affected in Moscow, Ryazan, Nizhny Novgorod and other cities. “At the moment, there are massive difficulties with network connection.We are working on it. We apologize for any inconvenience caused,” the company posted ...

  • Zomato Breach Exposes 17M User Records, Makes Deal with Hacker to Destroy Data

    May 19, 2017

    Restaurant guide Zomato has announced that it has been the victim of a data breach which saw the records of 17 million users being stolen from its database. The bad news is that 6.6 million of those are already on sale on a dark web marketplace. The good news is that the company has more ...

  • More Hacking Groups Found Exploiting SMB Flaw Weeks Before WannaCry

    May 19, 2017

    Since the Shadow Brokers released the zero-day software vulnerabilities and hacking tools – allegedly belonged to the NSA’s elite hacking team Equation Group – several hacking groups and individual hackers have started using them in their own way. The April’s data dump was believed to be the most damaging release by the Shadow Brokers till the ...

  • Available Tools Making Dent in WannaCry Encryption

    May 19, 2017

    Tools are beginning to emerge that can be used to start the process of recovering files encrypted by WannaCry on some Windows systems. This takes on extra urgency because today marks one week from the initial outbreak, and files encrypted during that first wave are on the clock and close to being lost forever. Adrien Guinet, of ...

  • Cyber superweapons and Windows XP – 5 reasons why the NHS attack was so successful

    May 18, 2017

    The Wanna Decryptor (Wannacry) attack is being cited as the largest ransomware attack in history – it was certainly the largest and most disruptive cyber attack ever launched against the UK’s National Health Service (NHS). The attack, which struck organisations across the globe on May 14 2017, knocked 40 NHS hospitals offline and cut access to ...

  • I gave up my job to retrain in cyber security with no experience of programming or coding

    May 18, 2017

    “Exactly how detailed are the background checks?” asked my uncle. “Do they look into your whole family?” Of all the responses my friends and family gave to the news I was changing careers to retrain in cyber security, this was probably the most curious – but also perhaps the most telling of the age we live ...

  • FDA, Industry Look for Gaps in Cybersecurity

    May 18, 2017

    The US Food and Drug Administration (FDA) on Thursday kicked off a fortuitously-timed public workshop on medical device cybersecurity, the agency’s third on the subject to date. At the workshop, FDA officials, representatives from industry and researchers are trying to determine the current gaps in regulatory science as it relates to cybersecurity with the aim of ...

  • Sales of Cybersecurity Insurance Policies Jump in Israel After Global Attack

    May 18, 2017

    Sales of cybersecurity insurance policies jump in Israel after global attack. Israel came out relatively unscathed from the massive cyberattack on the world’s computers over the weekend. But the event was enough to spook many Israeli business owners and sales of cyberinsurance have jumped 30% compared with the same time last year, according to AIG Israel, ...

  • Cyber security audits on power transmission communication systems from July

    May 18, 2017

    New Delhi: The Central Electricity Regulatory Commission (CERC) has said it is mandatory for Regional Power Committees to conduct third party cyber security audits on communication systems of electricity transmission towers from July It said the third party audit can be conducted only by CERT-In (India Computer Emergency Response Team). The commission has come out with directives ...