Recent Articles


Thu Mar 27

1 
In brief
Computer Fraud & Security, Volume 2014, Issue 3, March 2014, Pages 4
2 Tim Ring
Threat intelligence: why people don't share
Computer Fraud & Security, Volume 2014, Issue 3, March 2014, Pages 5-9
3 Steve Mansfield-Devine
Editorial
Computer Fraud & Security, Volume 2014, Issue 3, March 2014, Pages 2
4 
Alternative currencies fall prey to hackers and malware
Computer Fraud & Security, Volume 2014, Issue 3, March 2014, Pages 1-3
5 Steve Gold
The evolution of payment card fraud
Computer Fraud & Security, Volume 2014, Issue 3, March 2014, Pages 12-17
6 Sorin Mustaca
Are your IT professionals prepared for the challenges to come?
Computer Fraud & Security, Volume 2014, Issue 3, March 2014, Pages 18-20
7 
Health warnings for medical records
Computer Fraud & Security, Volume 2014, Issue 3, March 2014, Pages 2
8 Philip McMichael
The dangers of dead data
Computer Fraud & Security, Volume 2014, Issue 3, March 2014, Pages 9-12
9 
Events
Computer Fraud & Security, Volume 2014, Issue 3, March 2014, Pages 20
10 Julio Hernandez-Castro | Eerke Boiten
Cybercrime prevalence and impact in the UK
Computer Fraud & Security, Volume 2014, Issue 2, February 2014, Pages 5-8