About the Review

Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is a publication designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.

Latest news 

  • F-Secure buys industrial control security firm

    February 16, 2017

    F-Secure has acquired hardware and embedded system security firm Inverse Path. Financial terms of the deal, announced on Thursday, were undisclosed. Inverse Path provides focus hardware security technology to specialist sectors including automotive, avionics and industrial control, as well as traditional software applications. It sells to both mid-market and Fortune 500 companies. Jens Thonke, executive vice president, ...

  • Government Needs To Take Immediate Actions To Strengthen US Cybersecurity, GAO Says

    February 14, 2017

    Testifying before the House Subcommittee on Research and Technology, Committee on Science, Space and Technology today, Gregory C. Wilshusen, Director, Government Accountability Office (GAO) Information Security Issues, warned GAO “has consistently identified shortcomings in the federal government’s approach to ensuring the security of federal information systems and cyber critical infrastructure, as well as its approach to protecting ...

  • Cybersecurity alliance promoting intel-sharing seeks to expand

    February 14, 2017

    Hackers have probably had a harder time slipping past your security software, thanks to an alliance between some of the top vendors in the industry. The Cyber Threat Alliance, a group of security firms that often compete, says its efforts to share intelligence on the latest hacking threats have been paying off. Rivals including Fortinet, Intel Security, ...

  • Cybersecurity: Queen opens centre to protect against attacks

    February 14, 2017

    The Queen was shown how hackers could target the UK’s electricity supply as she opened a centre to protect the nation from cyber attacks. The National Cyber Security Centre – part of intelligence agency GCHQ – started work in October as part of a £1.9bn five-year strategy. Staff in Victoria, central London, will be joined by experts ...

  • Websites Can Now Track You Online Across Multiple Web Browsers

    February 14, 2017

    You might be aware of websites, banks, retailers, and advertisers tracking your online activities using different Web “fingerprinting” techniques even in incognito/private mode, but now sites can track you anywhere online — even if you switch browsers. A team of researchers has recently developed a cross-browser fingerprinting technique — the first reliable technique to accurately track ...

  • Nation States Distancing Themselves from APTs

    February 14, 2017

    Security researchers say a new trend in privateering is gaining traction among nation states, which are increasingly contracting with private companies to carry out state-sponsored attacks. Typically APT attacks have been the work of internal government spy apparatuses, but outsourcing allows nation states to shift risk, dodge attribution claims and take advantage of more sophisticated APT ...

  • Change In Corporate Mindset Needed To Combat Cyber Attacks

    February 13, 2017

    Yahoo!’s announcement late last year that it had been victimized by not one but two separate data breaches was the Gettysburg of corporate cyber attacks – the biggest battle yet waged. The first attack, which occurred in 2014, impacted more than 500 million Yahoo! user accounts, while the second assault, in August 2013, was nearly ...

  • Social Media Phishing Rose 500% in 2016 Q4

    February 9, 2017

    Throughout 2016, social media phishing attacks have climbed 500%, a new Proofpoint research reveals. The data includes cases of angler phishing, where attackers intercept customer support channels on social media in their attempt to steal people’s credentials, which proved to be the most common among financial services, but also entertainment accounts. According to Proofpoint’s Quarterly Threat ...

  • New Windows Trojan Spreads MIRAI Malware To Hack More IoT Devices

    February 9, 2017

    MIRAI – possibly the biggest IoT-based malware threat that emerged last year, which caused vast internet outage in October last year by launching massive distributed denial-of-service (DDoS) attacks against the popular DNS provider Dyn. Now, the infamous malware has updated itself to boost its distribution efforts. Researchers from Russian cyber-security firm Dr.Web have now uncovered a Windows ...

  • Watch Out! First-Ever Word Macro Malware for Apple Mac OS Discovered in the Wild

    February 9, 2017

    After targeting Windows-based computers over the past few years, hackers are now shifting their interest to Macs as well. The emergence of the first macro-based Word document attack against Apple’s macOS platform is the latest example to prove this. The concept of Macros dates back to 1990s. You might be familiar with the message that reads: “Warning: ...

  • INTERPOL World 2017 builds up momentum with strong support from public and private sectors

    February 9, 2017

    The second edition of INTERPOL World has garnered strong support from public and private sectors, both locally and on the international front. Owned by INTERPOL, the world’s largest police organization with 190 member countries, the event is supported by Singapore’s Ministry of Home Affairs (MHA), the World Economic Forum and CyberSecurity Malaysia, an agency under ...

  • 76 iOS Apps, Including Medical and Banking Tools, Are Exposing Data to Hackers

    February 7, 2017

    Seventy-six popular apps in the Apple App Store are vulnerable to silent interception of TLS-protected data due to a poor implementation of the cryptographic protocol. According to researcher Will Strafach, who wrote on Medium, the apps are vulnerable to man-in-the-middle attacks. Data that is normally protected by Transport Layer Security can now be read or manipulated ...