About the Review

Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is a publication designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.

Latest news 

  • Smart machines v hackers: How cyber warfare is escalating

    March 10, 2017

    There is a gaping hole in the digital defences that companies use to keep out cyber thieves. The hole is the global shortage of skilled staff that keeps security hardware running, analyses threats and kicks out intruders. Currently, the global security industry is lacking about one million trained workers, suggests research by ISC2 – the industry body ...

  • Privilege Escalation Flaw Patched in Schneider Wonderware

    March 10, 2017

    Data analysis and visualization software deployed inside a larger operational intelligence software sold by Schneider Electric has been patched against a critical privilege escalation vulnerability. The vulnerability was discovered in-house by Schneider Electric engineers in the Tableau server/desktop products. Versions 7.0 to 10.1.3 of the software running inside Schneider’s Wonderware Intelligence 2014R3 and earlier are affected. “The ...

  • Security & Counter Terror Expo 2017: an international platform for global security

    March 9, 2017

    UK’s leading national security event returns to London in May with a programme created to help those tasked with keeping nations, assets and businesses safe Terrorism has become part of every day life. Over the past 12 months, Europe has experienced some the deadliest attacks in its history and the threat level remains high worldwide. One of ...

  • Cyber Security in a Transport Revolution

    March 9, 2017

    The transport industry is undergoing a technological revolution driven by connectivity, Big Data, autonomy and Artificial Intelligence (AI). Driverless cars are on the horizon and the Internet of Things is being developed throughout our current transport infrastructure. However, these technologies pose some significant issues, particularly in the area of cyber security. To address some of these ...

  • Security Fail: Hackers Drawn to Energy Sector’s Lack of Controls

    March 8, 2017

    Oil and gas companies, including some of the most celebrated industry names in the Houston area, are facing increasingly sophisticated hackers seeking to steal trade secrets and disrupt operations, according to a newspaper investigation. A stretch of the Gulf Coast near Houston features one of the largest concentrations of refineries, pipelines and chemical plants in the ...

  • Major spam operation suffers data leak containing 1.4 billion records

    March 6, 2017

    A spamming group called River City Media (RCM), led by well known spammers Alvin Slocombe and Matt Ferris, has had its database of 1.4 billion records leaked. Revealed by Chris Vickery from the MacKeeper Security Researcher, in cooperation with CSO Online and Spamhaus, the researchers“stumbled upon a suspicious, yet publicly exposed, collection of files. Someone had ...

  • Hacker Selling Over 1 Million Decrypted Gmail and Yahoo Passwords On Dark Web

    March 6, 2017

    Hardly a day goes without headlines about any significant data breach. In past year, billions of accounts from popular sites and services, including LinkedIn, Tumblr, MySpace, Last.FM, Yahoo!, VK.com were exposed on the Internet. Now, according to the recent news, login credentials and other personal data linked to more than one Million Yahoo and Gmail accounts ...

  • Undetectable Mac Malware Proton for Sale on the Dark Web for 40 BTC

    March 6, 2017

    Hackers are now selling malware for Mac devices straight out on the dark web. They claim the malware is undetectable and provides hackers with the ability to take full control over MacOS devices by evading antivirus software. Proton, as it has been named, the malware is a Remote Administration Tool that is currently being sold over ...

  • This hard drive will self destruct. Data-wiping malware targets Europe

    March 6, 2017

    Shamoon—the mysterious disk wiper that popped up out nowhere in 2012 and took out more than 35,000 computers in a Saudi Arabian-owned gas company before disappearing—is back. Its new, meaner design has been unleashed three time since November. What’s more, a new wiper developed in the same style as Shamoon has been discovered targeting a ...

  • U.S. oil and gas companies are ‘still trying to catch up’ on cybersecurity, experts say

    March 6, 2017

    Digital systems and internet networks belonging to U.S. oil and gas companies have increasingly come under attack from hackers in recent years, experts tell CyberScoop. The Homeland Security Department received — between 2011 and 2015 — roughly 350 reports from domestic energy companies who were concerned about hackers probing or breaking into their systems, according to ...

  • WikiLeaks reveals CIA files describing hacking tools

    March 6, 2017

    WikiLeaks published thousands of documents Tuesday described as secret files about CIA hacking tools the government employs to break into users’ computers, mobile phones and even smart TVs from companies like Apple, Google, Microsoft and Samsung. The documents describe clandestine methods for bypassing or defeating encryption, antivirus tools and other protective security features intended to keep ...

  • New Fileless Malware Uses DNS Queries To Receive PowerShell Commands

    March 5, 2017

    It is no secret that cybercriminals are becoming dramatically more adept, innovative, and stealthy with each passing day. While new forms of cybercrime are on the rise, traditional activities seem to be shifting towards more clandestine techniques that involve the exploitation of standard system tools and protocols, which are not always monitored. The latest example of such ...