for Journals by Title or ISSN
for Articles by Keywords
help
Followed Journals
Journal you Follow: 0
 
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Journals are published.
Already have an account? Sign In to see the journals you follow.
Journal Cover
Computer Fraud & Security
Journal Prestige (SJR): 0.261
Number of Followers: 358  
 
  Full-text available via subscription Subscription journal
ISSN (Print) 1361-3723
Published by Elsevier Homepage  [3161 journals]
  • Events
    • Abstract: Publication date: September 2018Source: Computer Fraud & Security, Volume 2018, Issue 9Author(s):
       
  • How can adblocking play a significant role in an SME's defence
           strategy'
    • Abstract: Publication date: September 2018Source: Computer Fraud & Security, Volume 2018, Issue 9Author(s): Ben WilliamsThe advancement of technology today has turned the Internet into an open arena where individuals and organisations can spread information in ways that have never been possible before. While this has brought an enormous variety of opportunities for everyone to explore, it has also turned the Internet into an unpredictable ‘Wild West’ where only a few are held accountable. Cyber-threats such as phishing scams, fraud and malvertising are just some of the issues that have become increasingly relevant to organisations' safety.
       
  • Data in the post-GDPR world
    • Abstract: Publication date: September 2018Source: Computer Fraud & Security, Volume 2018, Issue 9Author(s): Akber DatooData is without doubt the ‘new oil’ – the currency that now underpins the digital economy. But in the wake of the Cambridge Analytica and Facebook misuse scandal, the concept of data monetisation is rightly under serious scrutiny. As we enter a new era of data privacy, from the recently implemented EU General Data Protection Regulation (GDPR) to rapidly growing awareness of the way personal data is harvested and mined, organisations can no longer adopt a cavalier attitude to customer data.
       
  • Scamming the scammers with their own tricks
    • Abstract: Publication date: September 2018Source: Computer Fraud & Security, Volume 2018, Issue 9Author(s): John WilsonDespite constant warnings from the security community and authorities, cases of business email compromise (BEC) continue to roll in. In its most recent report, the FBI estimated that financial losses from these attacks has amounted to more than $5.3bn since October 2013.
       
  • Crypto-jacking: how cyber-criminals are exploiting the crypto-currency
           boom
    • Abstract: Publication date: September 2018Source: Computer Fraud & Security, Volume 2018, Issue 9Author(s): Karl SiglerIn a little under a decade, crypto-currency has developed from an esoteric experiment to one of the hottest topics in both the technology and finance fields. Since the emergence of Bitcoin as the first centralised crypto-currency in 2009, the industry has exploded and there are more than 1,500 different currencies now available.In a little under a decade, crypto currency has developed from an esoteric experiment to one of the hottest topics in both the technology and finance fields.Alas it has also led to crypto-jacking where a target's machine is infected with mining malware. Organisations must ensure that they are able to spot the signs and shut illegal miners down, if they don't want to suffer overtaxed networks and angry customers, explains Karl Sigler of SpiderLabs at Trustwave.
       
  • GDPR is here and it is time to get serious
    • Abstract: Publication date: September 2018Source: Computer Fraud & Security, Volume 2018, Issue 9Author(s): Gary MigliccoIt is here. May 25 of this year marked the effective date of the most comprehensive privacy regulations on the planet. But most organisations in the US and Canada are probably not compliant with the European Union's sweeping new General Data Protection Regulation (GDPR) that has now taken effect.The General Data Protection Regulation (GDPR) is here and these tough new rules affect any company, government agency or other organisation that does business in Europe or handles the personal data of EU citizens or residents.There's no magic wand an organisation can wave to suddenly become compliant. And there's a surprising lack of awareness or concern about these regulations in the US. Gary Miglicco of PCM explains how GDPR means a dramatic change in how US companies manage their customers’ private data, and that it is only the start of a worldwide swing towards greater protection of consumers’ information.
       
  • In brief
    • Abstract: Publication date: September 2018Source: Computer Fraud & Security, Volume 2018, Issue 9Author(s):
       
  • Juniper Research: The Future of Cybercrime & Security
    • Abstract: Publication date: September 2018Source: Computer Fraud & Security, Volume 2018, Issue 9Author(s): Over the next five years we can expect to see 146 billion data records being stolen, according to a new report by Juniper Research. The firm estimates that 12 billion will be misappropriated this year, but that the numbers will continue to rise, reaching 33 billion in 2023.
       
  • Attackers are targeting people
    • Abstract: Publication date: September 2018Source: Computer Fraud & Security, Volume 2018, Issue 9Author(s): Cyber-attacks are becoming more targeted, with people rather than organisations being in the cross-hairs of hackers, according to the latest quarterly report from Proofpoint.
       
  • Editorial
    • Abstract: Publication date: September 2018Source: Computer Fraud & Security, Volume 2018, Issue 9Author(s): Steve Mansfield-DevineThe number of prosecutions under the Computer Misuse Act in the UK have fallen for the second year in a row, according to London law firm RPC. This may come as a surprise to anyone who is paying attention to the headlines.
       
  • Health sector leads sharp rise in data breach reports
    • Abstract: Publication date: September 2018Source: Computer Fraud & Security, Volume 2018, Issue 9Author(s): Over the past two years, the number of data breaches reported to the UK's Information Commissioner's Office (ICO) by affected organisations has risen by 75%. But insiders making mistakes is far more common than attacks by outsiders.
       
  • Events
    • Abstract: Publication date: August 2018Source: Computer Fraud & Security, Volume 2018, Issue 8Author(s):
       
  • Nation-state hacking – a threat to everyone
    • Abstract: Publication date: August 2018Source: Computer Fraud & Security, Volume 2018, Issue 8Author(s): Steve Mansfield-DevineThe notion of skilled hackers in the employ of national governments has long been a nightmare. But that bad dream became a reality years ago, and the use of cyber-attacks to support political goals has been concentrating the minds of those information security specialists charged with protecting the networks of organisations and governments. Lately, though, the tempo seems to have increased. From election meddling to bringing down power grids, nation-state hacking has moved into the headlines. So what is the scale of this activity and who should be concerned about it' In this interview, Simon Townsend, CTO at Ivanti, makes the case that this is an issue that affects every organisation.
       
  • Not your fairy-tale prince: the Nigerian business email compromise threat
    • Abstract: Publication date: August 2018Source: Computer Fraud & Security, Volume 2018, Issue 8Author(s): Adam MeyersBusiness email compromise (BEC) is a form of fraud by which a team of cyber-criminals convince victims to wire large amounts of funds or send valuable data to criminally controlled accounts. It is facilitated by victims' belief that they are being asked or instructed to do so by a trusted party.
       
  • Get the full e-signature picture to avoid falling foul of the law
    • Abstract: Publication date: August 2018Source: Computer Fraud & Security, Volume 2018, Issue 8Author(s): Sam CrookCompanies initiate e-signature projects for a variety of reasons. For some it is to improve document security, for others it is about speeding up the contract signing process, improving efficiency or cutting costs. These are tangible, easy-to-quantify benefits that resonate strongly with business leaders.Companies initiate e-signature projects for a variety of reasons. For some it is to improve document security, for others it is about speeding up the contract-signing process, improving efficiency or cutting costs for the business.These are tangible, easy-to-quantify benefits that resonate strongly with business leaders. Against a background of regulatory change, however, it is the part that e-signatures play in the management of data governance strategies, meeting compliance and reducing risk that makes them an essential tool in the corporate armoury, argues Sam Crook of Ascertia.
       
  • In brief
    • Abstract: Publication date: August 2018Source: Computer Fraud & Security, Volume 2018, Issue 8Author(s):
       
  • 2018 Thales Data Threat Report: Retail Edition
    • Abstract: Publication date: August 2018Source: Computer Fraud & Security, Volume 2018, Issue 8Author(s): Data beaches among US retailers have more than doubled in the past year, according to research by Thales eSecurity. The retail edition of its latest threat report found that half of US retailers had experienced a data breach over the previous 12 months, compared with 19% the previous year.
       
  • New alliance
    • Abstract: Publication date: August 2018Source: Computer Fraud & Security, Volume 2018, Issue 8Author(s): A new cross-sector alliance incorporating 17 UK cyber-security organisations has been created. The new alliance will help shape national cyber-security standards, drive advances in education and advise the Government on national cyber-security policy.
       
  • Cosco hit by ransomware
    • Abstract: Publication date: August 2018Source: Computer Fraud & Security, Volume 2018, Issue 8Author(s): Just as many organisations and security specialists have started to relax a little about the ransomware threat, another major organisation has been severely hit.
       
  • Editorial
    • Abstract: Publication date: August 2018Source: Computer Fraud & Security, Volume 2018, Issue 8Author(s): Steve Mansfield-DevineFor years, vendors and specialists have been pushing two-factor authentication (2FA) as the answer to our security woes. But it seems that not all 2FA solutions are quite up to the job.
       
  • Technology drives down card fraud in major European countries
    • Abstract: Publication date: August 2018Source: Computer Fraud & Security, Volume 2018, Issue 8Author(s): The levels of payment card fraud have dropped significantly in some European countries thanks to the use of technology, according to analytic software firm FICO. However, fraud levels across Europe as a whole are continuing to rise.
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 54.198.52.82
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-