{"title":"UK initiative to combat chip re-labelling","authors":"Elspeth Wales, Thomas Kaneshige","doi":"10.1016/0142-0496(95)80077-8","DOIUrl":"10.1016/0142-0496(95)80077-8","url":null,"abstract":"<div><p>A new UK initiative has announced its plans to combat the rapidly escalating international problem of chip theft, a problem that's leading to business questioning the credibility and authenticity of its supplies. The Joint Action Group (JAG), run by the London Metropolitan Police Service, earlier this year set up a computer crime sub-committee specifically to investigate the rapidly escalating problem of chip theft at the request of a group of multi-national companies, including IBM, Intel and BT.</p></div>","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Pages 17-18"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80077-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76615973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combatting the spread of calling-card and telephone fraud","authors":"Michael McCormack","doi":"10.1016/0142-0496(95)80078-6","DOIUrl":"10.1016/0142-0496(95)80078-6","url":null,"abstract":"<div><p>AT&T's Services corporate security manager has called for more cooperation between nations to combat the spread of calling-card and telephone fraud. Richard Petillo said that the spate of recent European arrests for phone-related offences showed that combined international enforcement efforts could make a dent in fraud.</p></div>","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 19"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80078-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89062416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New operating systems and old viruses","authors":"Dr Jan Hruska","doi":"10.1016/0142-0496(95)80075-1","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80075-1","url":null,"abstract":"<div><p>A large majority of viruses today are written for DOS running on IBM PCs and compatibles. The advent of new 32-bit operating systems and their eventual widespread use will have a major impact on the type of future viruses. This article discusses the impact of the current crop of 7000 DOS viruses on the new operating systems, looks at the new cross-platform WinWord.Concept macro virus and analyses some security implications of easy networking.</p></div>","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Pages 11-14"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80075-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136908960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}