About the Review


Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is a publication designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.


Latest news 


  • Former head of the Met’s Counter Terrorism Command joins Security & Counter Terror Expo team

    January 16, 2017

    Richard Walton, the former Commander of Counter Terrorism Command (SO15) for the Metropolitan Police Service has joined the Security & Counter Terror Expo team as a special advisor. Mr Walton has extensive knowledge and is recognised as a global expert on counter terrorism During his career he had responsibility for counter-terrorism policing during the Queen’s Diamond ...

  • Court Documents Reveal How Feds Spied On Connected Cars For 15 Years

    January 16, 2017

    It’s not always necessary to break into your computer or smartphone to spy on you. Today all are day-to-day devices are becoming more connected to networks than ever to add convenience and ease to daily activities. But here’s what we forget: These connected devices can be turned against us because we are giving companies, hackers, and ...

  • Secret details emerge on Iran’s Cyber Army

    January 15, 2017

    A report by Al Arabiya has revealed the secrets of the Iranian electronic army and its intelligence and cyber activities against states and institutions. It also examines the details behind the murder of Mohammad Hussein Tajik, its former commander. Tajik was sacked from his post, detained and tortured over accusations of spying and leaking information to the ...

  • Smaller firms set to ‘face £52bn in fines’ for security breaches as cyber-crime skyrockets

    January 14, 2017

    British firms were each subjected to an average of almost 230,000 cyber attacks in 2016, according to analysis from business internet service provider Beaming. The average volume of attacks hitting individual company firewalls passed the 1,000 per day mark for the first time in November. Meanwhile, the Payment Card Industry Security Standards Council suggested that UK firms ...

  • When Cybersecurity Meets Physical Security

    January 13, 2017

    In a recent interview with CNN, the Director of the Secret Service noted that his organization is increasingly focusing on the cyber security of the physical facilities visited by the President of the United States as part of its duty to protect him. This raises the fascinating question of just how much cybersecurity will become ...

  • What’s Up With the WhatsApp ‘Backdoor’ Story? Feature or Bug!

    January 13, 2017

    By definition: “Backdoor is a feature or defect of a computer system that allows surreptitious unauthorized access to data, ” either the backdoor is in encryption algorithm, a server or in an implementation, and doesn’t matter whether it has previously been used or not. Yesterday, we published a story based on findings reported by security researcher ...

  • Hackers Hacked Phone Hacking Company

    January 13, 2017

    Cellebrite made the news several times in the last 12 months or so, pretty much because of the company’s phone hacking capabilities and its involvement in the San Bernardino scandal when it was asked to break into the iPhone used by a terrorist. This time, however, Cellebrite is making the headlines because of a different reason: ...

  • Detroit Car Makers Allegedly Hacked, Names and Social Security Numbers Stolen

    January 13, 2017

    Detroit’s Big Three automakers are the latest big companies to become victims of hackers, with a new report now claiming that employees’ names and social security numbers might have been exposed during a breach. Details are very sketchy at the moment, and there is no confirmation from the involved companies, but according to the 7 Action ...

  • Hedge funds to invest more in technology and cyber defence

    January 12, 2017

    Investments by hedge funds into technology advancement is set to increase in the coming five years, as more executives within the industry become concerned about the impact of technology on their competitiveness. A new report finds that they will leverage a broad range of investment strategies to meet needs, from building their own systems to outsourcing. ...

  • ‘We need to know how a malicious hacker will break into our network to understand how to defend it’

    January 12, 2017

    It has been over 11 years since Abertay introduced the UK’s first BSc Ethical Hacking degree, followed by the MSc for graduates with a computing background. We received a lot of attention from both the media and others in the academic community surrounding the ethics of teaching people how to hack and the value of specialist ...

  • Rudy Giuliani to lead Trump’s cybersecurity team

    January 12, 2017

    Mr Giuliani, once a leading contender for secretary of state, said Mr Trump would meet the team on a regular basis. He was selected because of his private sector cybersecurity expertise, a Trump transition team statement said. Mr Trump has said he plans to create a cybersecurity team within his first 90 days in office. Mr Giuliani’s appointment ...

  • Airport boarding gate display leaks booking codes, puts passenger data at risk

    January 10, 2017

    While waiting for my flight to begin boarding at a European airport recently, I noticed that one of the screens at the gate showed a timed-out web browser window. Being curious and more than a little bored, I opened the IP address displayed on the screen on my smartphone expecting it to be unreachable from ...