Pub Date : 2011-03-01DOI: 10.1016/S1754-4548(11)70024-9
Davey Winder
While online gamers might not consider information security a priority, online gambling operators are very much aware that their sites are great big targets for cybercriminals. Davey Winder asks what online gaming sites are doing to secure themselves, and their customers, against a rising tide of cybercrime?
{"title":"Phishing for Chips: Why the Online Gambling Industry is Odds-On to Beat Cybercrime","authors":"Davey Winder","doi":"10.1016/S1754-4548(11)70024-9","DOIUrl":"10.1016/S1754-4548(11)70024-9","url":null,"abstract":"<div><p>While online gamers might not consider information security a priority, online gambling operators are very much aware that their sites are great big targets for cybercriminals<span>. Davey Winder asks what online gaming sites are doing to secure themselves, and their customers, against a rising tide of cybercrime?</span></p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 32-34"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70024-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83743020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-01DOI: 10.1016/S1754-4548(11)70028-6
Marc Maiffret
{"title":"Night Dragon Will not Be Defeated $44.99 at a Time","authors":"Marc Maiffret","doi":"10.1016/S1754-4548(11)70028-6","DOIUrl":"10.1016/S1754-4548(11)70028-6","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Page 45"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70028-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89769845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-01DOI: 10.1016/S1754-4548(11)70017-1
Eleanor Dallaway (Editor)
Over the past few months, I've probably talked to around fifty information security professionals. In 90% of cases, the topic of discussion was technology. The exceptions to the rule – and thus my most memorable discussions – included my time spent with John Colley, (ISC)2, and Martin Smith, The Security Company.
在过去的几个月里,我可能与大约50位信息安全专业人士交谈过。在90%的情况下,讨论的主题是技术。这条规则的例外——也是我最难忘的讨论——包括我与John Colley (ISC)2和Martin Smith (The Security Company)的讨论。
{"title":"People Are People","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70017-1","DOIUrl":"10.1016/S1754-4548(11)70017-1","url":null,"abstract":"<div><p>Over the past few months, I've probably talked to around fifty information security professionals. In 90% of cases, the topic of discussion was technology. The exceptions to the rule – and thus my most memorable discussions – included my time spent with John Colley, (ISC)<sup>2</sup>, and Martin Smith, The Security Company.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70017-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80645593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-01DOI: 10.1016/S1754-4548(11)70021-3
Lauren Moraski
Prosecuting cybercrime is no easy task. Even with today's forensic capabilities, legal inadequacies in various jurisdictions, not to mention uneven enforcement, make stemming the tide a rather daunting task. Lauren Moraski reports on the complications
{"title":"Cybercrime Knows No Borders","authors":"Lauren Moraski","doi":"10.1016/S1754-4548(11)70021-3","DOIUrl":"10.1016/S1754-4548(11)70021-3","url":null,"abstract":"<div><p>Prosecuting cybercrime is no easy task. Even with today's forensic capabilities, legal inadequacies in various jurisdictions, not to mention uneven enforcement, make stemming the tide a rather daunting task. Lauren Moraski reports on the complications</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 20-23"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70021-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81084403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-01DOI: 10.1016/S1754-4548(11)70019-5
Eleanor Dallaway
You'd be hard pressed to find anyone in the UK infosec industry who doesn't know of John Colley. He is to infosec what Simon Cowell is to the music industry – a true figurehead (albeit, less scary). He doesn't attribute his high profile to his impressive CV though – instead, as Eleanor Dallaway finds out, he believes it to be the result of his networking with helpful peers over the years
{"title":"John Colley","authors":"Eleanor Dallaway","doi":"10.1016/S1754-4548(11)70019-5","DOIUrl":"10.1016/S1754-4548(11)70019-5","url":null,"abstract":"<div><p>You'd be hard pressed to find anyone in the UK infosec industry who doesn't know of John Colley. He is to infosec what Simon Cowell is to the music industry – a true figurehead (albeit, less scary). He doesn't attribute his high profile to his impressive CV though – instead, as Eleanor Dallaway finds out, he believes it to be the result of his networking with helpful peers over the years</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 10-13"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70019-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90522560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-01-01DOI: 10.1016/S1754-4548(11)70002-X
Drew Amorosi
Drew Amorosi recounts the events surrounding WikiLeaks' publication of thousands of confidential US diplomatic cables that recently garnered so much international attention, and takes a look at the political fallout.
{"title":"WikiLeaks ‘Cablegate’ Dominates Year-End Headlines","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70002-X","DOIUrl":"10.1016/S1754-4548(11)70002-X","url":null,"abstract":"<div><p><strong>Drew Amorosi</strong> recounts the events surrounding WikiLeaks' publication of thousands of confidential US diplomatic cables that recently garnered so much international attention, and takes a look at the political fallout.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 6-9"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70002-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88059860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-01-01DOI: 10.1016/S1754-4548(11)70007-9
Wendy M. Grossman
The recent push to save the planet from environmental catastrophe in some quarters has dovetailed nicely with organizations' need to pare down budgets – making for some nice PR. But, as Wendy M. Grossman demonstrates, hiding behind some ‘green’ initiatives are increased security risks
{"title":"The Dirty Secrets of Green IT","authors":"Wendy M. Grossman","doi":"10.1016/S1754-4548(11)70007-9","DOIUrl":"10.1016/S1754-4548(11)70007-9","url":null,"abstract":"<div><p>The recent push to save the planet from environmental catastrophe in some quarters has dovetailed nicely with organizations' need to pare down budgets – making for some nice PR. But, as <strong>Wendy M. Grossman</strong> demonstrates, hiding behind some ‘green’ initiatives are increased security risks</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 28-30"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70007-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"98102074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-01-01DOI: 10.1016/S1754-4548(11)70014-6
Raj Samani
{"title":"A Brand New Old Classic","authors":"Raj Samani","doi":"10.1016/S1754-4548(11)70014-6","DOIUrl":"10.1016/S1754-4548(11)70014-6","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Page 46"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70014-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90612831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}