About the Review

Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is a publication designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.

Latest news 

  • Laptops With More than 3.7 Million Hong Kong Voters’ Data Stolen

    March 28, 2017

    The Registration and Electoral Office of Hong Kong has reported the disappearance of two laptop computers after the chief executive election. The laptops contained around 3.7 million city’s voters personal information that could be compromised after the one of the most significant, if not the biggest ever data breaches in Hong Kong. The information that was ...

  • Nato to spend £2.6 billion on satellites, cyber security and drones

    March 27, 2017

    Nato will announce plans to spend €3bn (£2.6bn) on upgrading its satellite and computer technology over the next three years, a senior official has said. As the alliance adapts to new types of warfare it hoped the technology will deter hackers, as the North Atlantic Treaty Organisation (Nato) acknowledges conflicts are increasingly fought out online rather than in the air, on land or at sea. The ...

  • New Clues Surface on Shamoon 2’s Destructive Behavior

    March 27, 2017

    Researchers on Monday reported progress in piecing together some of the missing pieces of the Shamoon 2 puzzle that have been eluding them when it comes to lateral network movement and execution of the Disttrack malware component used in past campaigns. Shamoon 2 uses a combination of legitimate tools, such as the open source utility PAExec, and ...

  • Germany Fought Off Two Fancy Bear Cyber Attacks in 2016

    March 27, 2017

    Fears about Russian involvement in European elections, especially after last year’s US election, aren’t exactly unfounded or born out of paranoia. In fact, Germany says it fended off two cyber attacks coming from the same cybercriminals that targeted Hillary Clinton’s campaign. Arne Schoenbohm, a top German official, told Reuters they managed to fight off two attacks ...

  • Symantec API Flaws reportedly let attackers steal Private SSL Keys and Certificates

    March 27, 2017

    A security researcher has disclosed critical issues in the processes and third-party API used by Symantec certificate resellers to deliver and manage Symantec SSL certificates. The flaw, discovered by Chris Byrne, an information security consultant and instructor for Cloud Harmonics, could allow an unauthenticated attacker to retrieve other persons’ SSL certificates, including public and private keys, ...

  • Internet-Connected Medical Washer-Disinfector Found Vulnerable to Hacking

    March 27, 2017

    Internet-of-Things devices are turning every industry into the computer industry, making customers think that their lives would be much easier with smart devices. There are, of course, some really good reasons to connect certain devices to the Internet. For example, remotely switching on your A/C a few minutes before you enter your home, instead of leaving ...

  • Ex-cyber security chief says Government is ‘using’ Westminster attack to grab unnecessary spying powers

    March 27, 2017

    The Ministry of Defence’s former cyber security chief has accused the Government of trying to “use” the devastating Westminster attack to grab unnecessary and intrusive surveillance powers. Major General Jonathan Shaw said ministers were attempting to “use the moment” to push for security services having more control, despite there being only a weak case for it. Home Secretary Amber Rudd ...

  • How CISOs Can Create A Balanced Portfolio Of Cybersecurity Products

    March 26, 2017

    We’re entering a world of deepening complexity and far vaster breadth when it comes to security for the modern enterprise. With companies integrating legacy data centers, manufacturing facilities, and networks with the cloud and the Internet of Things (IoT), all connecting to an uncontrollable mass of independently governed endpoints, CIOs and CISOs face a constant ...

  • Indian Startup Develops a Next-Gen Cybersecurity Solution on the Blockchain

    March 26, 2017

    A new innovative prototype startup powered by blockchain technology for cybersecurity has recently launched in India aimed at curbing the global phenomenon of cybercrime. Mumbai-based Block Armour was thought up by Narayan Neelakantan, former CISO and Head of IT Risk and Compliance with India’s National Stock Exchange (NSE) and Floyd DCosta, who has a background in ...

  • US Critical Infrastructure Cybersecurity Milestone

    March 25, 2017

    Last week the Idaho National Laboratory (INL) and the Department of Homeland Security (DHS) announced the successful completion of the 100th iteration of the Industrial Control Systems Cybersecurity training on defending systems used across the critical infrastructure sectors. Since April 2007, over 4,000 cybersecurity professionals have participated in the advanced course. These professionals represent all ...

  • Jefferies Has 4 Cybersecurity Stocks to Buy as Growth to Continue for Years

    March 24, 2017

    Just a few short years ago, cybersecurity was the hottest of red-hot tech sectors and we covered the top companies seemingly all the time. Scorching hot initial public offerings had lots of investors, especially the fast-money type, going all in here. Then suddenly, things slowed to a crawl. The hot IPOs crashed, and the huge ...

  • Senators reintroduce a bill to improve cybersecurity in cars

    March 23, 2017

    Senators Ed Markey of Massachusetts and Richard Blumenthal of Connecticut have reintroduced the Security and Privacy in Your Car (SPY Car) Act of 2017. They first introduced the bill, along with a similar bill for aircraft, during the last session. The SPY Car Act places the onus for automotive cybersecurity and privacy standards on the shoulders ...