{"title":"Passwords: The cyber security lesson that was never learned?","authors":"S. Furnell","doi":"10.12968/s1361-3723(22)70587-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70587-8","url":null,"abstract":"Throughout the years, passwords have enjoyed the curious distinction of being both the most maligned and the most widely used aspect of cyber security. We know their weaknesses and people tend to use them badly, yet they continue to be deployed in ways that have allowed poor practices to continue. As a result, the same problems have persisted and we have appeared reluctant to learn the lessons that would improve the situation.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81945805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Why data belongs at the heart of the organisation","authors":"R. Pathak","doi":"10.12968/s1361-3723(22)70582-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70582-9","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"151 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74496375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strategies for counteracting social engineering attacks","authors":"R. Fatima, Affan Yasin, Lin Liu, Wang Jianmin","doi":"10.12968/s1361-3723(22)70583-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70583-0","url":null,"abstract":"As the result of a five-year project investigating social engineering attacks, researchers at Tsinghua University, China have identified a number of strategies that organisations can use to protect themselves. However, they warn that there is no single strategy that works for all forms of attack. And when choosing the right methods it's essential to consider the context, the environment and the available facilities.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90509184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Zscaler: 2022 ThreatLabz State of Ransomware Report","authors":"","doi":"10.12968/s1361-3723(22)70581-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70581-7","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80493817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber security challenges in self-driving cars","authors":"A. Mahlous","doi":"10.12968/s1361-3723(22)70580-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70580-5","url":null,"abstract":"Self-driving cars, which guide themselves and perform operations by sensing their environment without human intervention, rely on sensors, actuators, complex algorithms, machine-learning systems and powerful processors to execute software. Their benefits include reducing accidents – including those caused by human errors such as drink-driving or using mobile phones, both of which are major causes of road carnage. A major drawback is that these vehicles are vulnerable to hacking because they are connected to the Internet. Manufacturers have developed an array of security mechanisms to shield these automobiles from unauthorised access, yet hackers continue to develop methods of bypassing their security layers.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82040635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HEAT-wave – defining a new era of cyberthreats","authors":"Jonathan Lee","doi":"10.12968/s1361-3723(22)70576-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70576-3","url":null,"abstract":"The acceleration of digital transformation initiatives that have catapulted users, data and business-critical applications to the cloud offers huge opportunities for businesses, but even more promise for threat actors. One of the biggest problems today is the legacy approach to security that many organisations take to protect networks from a strategic and technological standpoint: one that's cemented in ‘detect and respond’.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"63 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90428392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensuring cyber resilience in a digital world","authors":"D. Mattoon","doi":"10.12968/s1361-3723(22)70577-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70577-5","url":null,"abstract":"While there are advantages to having connected devices such as lighting systems, doorbells and refrigerators, they also open the door to cyber attacks and the consequences that come with them. It is crucial that the ongoing integrity and safety of these devices are ensured, with cyber resilience playing a key role in mitigating the risk of potential attacks.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80839450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Can PCI DSS 4.0 reverse the decline in compliance?","authors":"Phil Robinson","doi":"10.12968/s1361-3723(22)70579-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70579-9","url":null,"abstract":"The Payment Card Industry Security Standards Council (PCI SSC) finally released the long-awaited version 4.0 of the PCI Data Security Standard (PCI DSS) at the end of March after three long years of consultation. It's been described as the most substantial update to the standard for 17 years and the Council received unprecedented levels of feedback, with more than 6,000 items from over 200 members of the global payments industry. But what are its effects likely to be?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83504063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sophos: The State of Ransomware 2022","authors":"Steve Mansfield-Devine","doi":"10.12968/s1361-3723(22)70573-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70573-8","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73568730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}