About the Review


Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is a publication designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.


Latest news 


  • German, Israeli companies to cooperate on cybersecurity

    April 12, 2017

    The Cyber-Security Council Germany said on Wednesday it opened its first international chapter with security firm Checkmarx in Israel, establishing a bridge between German and Israeli cybersecurity communities. “Cyber threats are not bound to national borders, so that transnational cooperation and networking is inevitable for the exchange of know-how and best practices,” said Philipp von Saldern, ...

  • Cisco to train 250,000 students in India in cyber security, IoT

    April 12, 2017

    Aiming to help create startups and build successful technology careers, Cisco will train 2,50,000 students in the country over a period of time, a top executive from the global networking giant said. “We have done a lot of work in education and there are campuses that use our technology. We will skill 250,000 students in the ...

  • German, Israeli companies to cooperate on cybersecurity

    April 12, 2017

    The Cyber-Security Council Germany said on Wednesday it opened its first international chapter with security firm Checkmarx in Israel, establishing a bridge between German and Israeli cybersecurity communities. “Cyber threats are not bound to national borders, so that transnational cooperation and networking is inevitable for the exchange of know-how and best practices,” said Philipp von Saldern, ...

  • Systems-on-a-chip are a huge, unaudited attack surface, says Project Zero’s Wi‑Fi attack man

    April 12, 2017

    The internal inter-chip communications of devices like smartphones are a “huge, mostly unaudited attack surface,” according to Gal Beniamini of Google’s Project Zero, in his promised follow-up to last week’s demonstration of how to attack Wi‑Fi chips over the air. His April 4 “part one” prompted emergency patches from Apple and Google, new drivers from Broadcom ...

  • Private sector’s national cybersecurity strategy contributions lacking

    April 11, 2017

    The private sector operates much of U.S. critical infrastructure, but is it doing enough to further national cybersecurity strategy efforts designed to protect these assets? The U.S. government has been very public about its concern for national cybersecurity. There have been grandiose speeches, presidential declarations and several attempts by the legislature to pass new cybersecurity laws. ...

  • Emergency cyber security unit to handle all reports of cyber threats in New Zealand

    April 11, 2017

    A new national cyber security unit will allow any New Zealander to report a suspected cyber threat – whether they’re an individual being targeted by online scam, or a business the subject of major hack. The Computer Emergency Response Team will act as a single point of contact to triage all cyber security threats in New ...

  • Hackers Can Steal Your Passwords Just by Monitoring SmartPhone Sensors

    April 11, 2017

    Do you know how many kinds of sensors your smartphone has inbuilt? And what data they gather about your physical and digital activities? An average smartphone these days is packed with a wide array of sensors such as GPS, Camera, microphone, accelerometer, magnetometer, proximity, gyroscope, pedometer, and NFC, to name a few. Now, according to a team ...

  • Autonomous car cyber security consortium awarded funding

    April 11, 2017

    An autonomous car cyber security group will receive government funding as part of a plan to make the UK a hub for the development of self-driving cars, it has been announced. The 5*Stars consortium, which incorporates HORIBA MIRA, Ricardo, Thatcham Research, Roke and Axillium Research, will get grants to develop defences against cyber attacks on autonomous ...

  • Adobe Patches 59 Vulnerabilities Across Flash, Reader, Photoshop

    April 11, 2017

    Adobe patched 59 vulnerabilities in five different products, including Flash Player, Acrobat/Reader, Photoshop, Adobe Campaign, and its Adobe Creative Cloud App as part of its regularly scheduled software update today. The company warned in a series of security bulletins posted shortly before noon Tuesday that the bulk of the bugs, 44, are critical and could lead to code ...

  • Why cybersecurity needs more attention from business leaders

    April 10, 2017

    As businesses have become more dependent on technology, their exposure to cybersecurity threats increases – driving a need for boards and senior management to understand the risks. Cybercrime has grown so much that the Office for National Statistics (ONS) recently began including it in official figures. In 2016, a report from the National Crime Agency found ...

  • Dridex Campaigns Hitting Millions of Recipients Using Unpatched Microsoft Zero-Day

    April 10, 2017

    This weekend saw multiple reports of a new zero-day vulnerability that affected all versions of Microsoft Word. Today, Proofpoint researchers observed the document exploit being used in a large email campaign distributing the Dridex banking Trojan. This campaign was sent to millions of recipients across numerous organizations primarily in Australia. This represents a significant level of ...

  • Symantec Links Espionage Group to CIA via Tools Exposed by WikiLeaks

    April 10, 2017

    Symantec announced that it had connected at least 40 attacks across 16 countries where tools obtained and exposed by WikiLeaks via the Vault 7 revelations about CIA’s espionage tactics were used. In a lengthy report, Symantec talks about a highly organized group they named Longhorn and which they linked to all these attacks. While stopping short ...