About the Review

Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is a publication designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.

Latest news 

  • What’s In Shodan? Analyzing Exposed Cyber Assets in the United States

    March 15, 2017

    The United States is home to millions of unsecured and exposed cyber assets. By “unsecured” and “exposed” we don’t necessarily mean that these devices have already been compromised. Rather, this means they are vulnerable to cyber attacks due to inadequate security or poor configuration. Some cyber assets may even have remote access enabled for troubleshooting ...

  • NSA hacking chief’s mission impossible: Advising White House on cybersecurity

    March 15, 2017

    NSA hacking crew bossman Rob Joyce is set to join US President Donald Trump’s National Security Council as a cybersecurity adviser. Joyce headed up the NSA’s Tailored Access Operations division, the spy agency’s elite computer exploitation squad. Whispers have been sloshing around since the weekend that Joyce was tapped to shape cybersecurity policy for the Trump administration. ...

  • Cyber security: Experts warn on rise of hacker ransoms

    March 14, 2017

    Smartphones, watches, televisions and fitness trackers could be used to hold people to ransom over personal data, cyber security experts have warned. Ransomware, which makes devices unusable until their owners pay to unlock them, has become increasingly prevalent in the past year, they say. Devices holding photos, emails and fitness information could be targeted. The risk to business ...

  • Almost All Security Professionals Fear an Increase in Attacks on Industrial IoT

    March 14, 2017

    As nice as it is to have a connected world, the security threats brought on by the desire to have every device we own connected to the Internet are great. In fact, a staggering 96% of IT security professionals expect an increase in attacks on industrial Internet of Things. According to a new survey published by ...

  • Germany’s Merkel warns against cyber attacks on infrastructure

    March 14, 2017

    German Chancellor Angela Merkel said on Tuesday protecting infrastructure from potential cyber attacks was a top priority and the federal government had to work together with localities on that. “Today we have a huge amount of possibilities to paralyze infrastructure from cyber attacks and it is… very very difficult. There are examples from Ukraine that are ...

  • Cybercriminals getting as good as nation state spies – report

    March 14, 2017

    The European energy sector is being targeted by advanced threat actors seeking proprietary information to advance the capabilities of domestic companies, according to FireEye Mandiant. The latest annual report by FireEye’s incident response arm further warns that cyber threat groups are also targeting European industrial control systems for potentially disruptive or destructive operations. The capability of cybercriminals ...

  • Spam campaign targets financial institutions with fake security software

    March 13, 2017

    Last month, Symantec detected a spam campaign mainly targeting financial institutions, which used social engineering to try trick victims into installing “virus detection software” that was in fact an information stealing Trojan (W32.Difobot). The emails purported to come from HSBC, a banking and financial services company based in London, even displaying an hsbc.com email address. The ...

  • Over 65.3M LinkedIn Users Have Weak Passwords, the Rest Can Be Easily Cracked

    March 13, 2017

    Last year, LinkedIn suffered a massive data breach where millions of passwords were leaked, and it seems that out of the entire trove of data, 35% of users were using weak passwords to begin with, while other 65% were using passwords that can be cracked. Researchers at behavioral firewall company Preempt wanted to know how many ...

  • Cybersecurity: Why every member of staff has a role to play

    March 13, 2017

    A recent study by ISC² found that when it comes to cybersecurity, over half of British companies are “chronically understaffed” without the right number of IT specialists to deal with online threats. Worryingly, the same research said that the global shortfall of cyber security workers was set to reach 1.8 million in the next five years, ...

  • US Military Security Clearance Files Leak Due to Unsecured Drive

    March 13, 2017

    US Air Force documents were left on an unsecured backup drive, exposing highly sensitive personnel files on over 4,000 senior and high-ranking officers. According to MacKeeper Security Researchers, the gigabytes of files were accessible to anyone because there was no password to protect the backup drive. It seems the information found there varied from names and ...

  • Malware infecting Androids somewhere in the supply chain

    March 12, 2017

    Smartphones from Samsung, LG, Xiaomi, ZTE, Oppo, Vivo, Asus and Lenovo have been spotted sporting malware they apparently carried when they were shipped. The malware discovered by Check Point Software Technologies included info-stealers, ransomware like Slocker; Loki, which shows “illegitimate advertisements” to generate revenue while stealing device information; and information stealers. Check Point says it found infections ...

  • Cybersecurity And Financial Institutions: How New York’s “First-In-The-Nation” Data Security Regulations May Impact You

    March 11, 2017

    March 1, 2017 marked the implementation of New York’s cybersecurity regulations, subjecting covered financial institutions to arguably the most burdensome cybersecurity regime yet. The regulations, promulgated by the New York State Department of Financial Services (“NYDFS”), require banks, insurance companies, and other entities regulated by NYDFS to establish substantive cybersecurity programs and policies and to annually ...