About the Review

Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is a publication designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.

Latest news 

  • UK Cybersecurity: Permanent job salaries growing faster than contractor pay rises

    January 30, 2017

    Demand for cyber security skills in the UK means that salaries for full time IT security jobs are increasing faster than contractor rates, according to a new survey. Annual IT security permanent salaries climbed by 5 per cent (from Q4 2015 to Q4 2016) to £57,706, compared to a 0.62 per cent increase for contractor day ...

  • Dridex Is Back, Uses New Windows UAC Bypass Method

    January 30, 2017

    Banking malware Dridex is back and it’s worse, targeting British financial institutions with a new technique that has the capability of bypassing Windows User Account Control. Researchers at security firm Flashpoint detected small phishing and spear-phishing campaigns targeting specific recipients. The messages contained macros in document attachments that allowed the download of the Dridex malware. This User ...

  • Europol and Global Cyber Alliance team up to fight cyber-crime

    January 30, 2017

    Europol and the Global Cyber Alliance (GCA) have signed a Memorandum of Understanding (MoU) to cooperate on decreasing systemic cyber-risk and improving internet security throughout Europe and beyond. As part of the MoU, Europol and GCA will fight cyber-crime through the exchange of information on cyber-crime trends and joint international projects to increase cyber-security. To this end, ...

  • Trump expected to sign cyber security executive order Tuesday

    January 30, 2017

    January 30, 2017 President Donald Trump is expected to sign an executive order on cyber security on Tuesday, two sources familiar with the situation said, marking the first action to address what he has called a top priority of his administration. The order is expected to commission several different reviews of the government’s offensive and defensive cyber ...

  • UK spy agency hires Indian startup for cybersecurity programme

    January 27, 2017

    The next time a hacker tries to break into a British bank, chances are that technology from a small Indian startup will detect the hack. Earlier this month, Britain’s top communications spy agency GCHQ (Government Communications Headquarters), which had cracked Nazi Germany’s legendary Enigma codes during the Second World War, chose Pune-based cyber security startup ...

  • Second FSB Agent Arrested for Treason Revealed as Notorious Hacker

    January 27, 2017

    Major Dmitry Dokuchaev, one of four cyber-security experts arrested by the Kremlin on charges of treason, has allegedly been revealed as an infamous Russian hacker. Dokuchaev worked as a hacker under the alias “Forb” until Russia’s Federal Security Service (FSB) threatened to jail him, an unverified source told the RBC newspaper. “Forb” gave a interview to Russian ...

  • How CXOs should plan their approach to IoT

    January 27, 2017

    Just as it was with virtualization and cloud computing, moving into an Internet of Things (IoT) project can unleash a barrage of questions aimed at C-level executives from their board members. These questions usually center around what the company is doing (or planning to do) with IoT. When these questions build pressures to get going, a ...

  • Last Year’s Data Breaches Exposed 4.2 Billion Records, Most from America

    January 26, 2017

    The United States was the main target of hacker attacks last year, resulting in a record number of data breaches. According to a report from Risk Based Security, during 2016 there were 4,149 data breaches which resulted in the exposure of 4.2 billion records. Nearly half, or more specifically 47.5%, of the breaches that exposed user ...

  • Four-star Alpine hotel fell victim to blackmailers who hacked into their electronic keycard system

    January 26, 2017

    One of Europe’s most luxurious hotels has admitted paying 1,500 euros (£1,279) to cyber blackmailers who hacked into their electronic key system and locked scores of guests in their rooms. The hackers promised to restore the system at the Seehotel Jaegerwirt in the Austrian Alps quickly if 1.74 bitcoins (1,500 euros) was transferred to them. The managers ...

  • Trump order strips privacy rights from non-U.S. citizens, could nix EU-US data flows

    January 26, 2017

    An Executive Order signed by U.S. President Donald Trump in his first few days in office could jeopardize a six-month-old data transfer framework that enables EU citizens’ personal data to flow to the U.S. for processing — with the promise of ‘essentially equivalent’ privacy protection once it gets there. Close to 1,500 companies have signed up ...

  • Apple iPhone 7 is being hardened to handle military-grade secrets

    January 25, 2017

    The iPhone 7 is being turned into a phone capable of safeguarding military-level secrets for the UK armed forces. Telecoms giant BT is hardening the security of the device to allow UK military personnel to use it to discuss ‘secret’ matters and for storing sensitive data. Describing the iPhone 7 as the “device of choice” for the ...

  • New Trojan Turns Thousands Of Linux Devices Into Proxy Servers

    January 25, 2017

    A new Trojan has been discovered in the wild that turns Linux-based devices into proxy servers, which attackers use to protect their identity while launching cyber attacks from the hijacked systems. Dubbed Linux.Proxy.10, the Trojan was first spotted at the end of last year by the researchers from Russian security firm Doctor Web, who later identified ...