Ransomware: taking businesses hostage S Mansfield-Devine Network Security 2016 (10), 8-17, 2016 | 138 | 2016 |
Beyond Bitcoin: using blockchain technology to provide assurance in the commercial world S Mansfield-Devine Computer Fraud & Security 2017 (5), 14-18, 2017 | 123 | 2017 |
The growth and evolution of DDoS S Mansfield-Devine Network Security 2015 (10), 13-20, 2015 | 102 | 2015 |
Danger in the clouds S Mansfield-Devine Network security 2008 (12), 9-11, 2008 | 100 | 2008 |
Interview: BYOD and the enterprise network S Mansfield-Devine Computer fraud & security 2012 (4), 14-17, 2012 | 87 | 2012 |
Anonymous: serious threat or mere annoyance? S Mansfield-Devine Network Security 2011 (1), 4-10, 2011 | 78 | 2011 |
DDoS goes mainstream: how headline-grabbing attacks could make this threat an organisation's biggest nightmare S Mansfield-Devine Network Security 2016 (11), 7-13, 2016 | 75 | 2016 |
The ashley madison affair S Mansfield-Devine Network Security 2015 (9), 8-16, 2015 | 60 | 2015 |
Anti-social networking: exploiting the trusting environment of Web 2.0 S Mansfield-Devine Network Security 2008 (11), 4-7, 2008 | 59 | 2008 |
Open banking: opportunity and danger S Mansfield-Devine Computer Fraud & Security 2016 (10), 8-13, 2016 | 58 | 2016 |
Fileless attacks: compromising targets without malware S Mansfield-Devine Network Security 2017 (4), 7-11, 2017 | 53 | 2017 |
Hacktivism: assessing the damage S Mansfield-Devine Network Security 2011 (8), 5-13, 2011 | 51 | 2011 |
Darknets S Mansfield-Devine Computer Fraud & Security 2009 (12), 4-6, 2009 | 51 | 2009 |
DevOps: finding room for security S Mansfield-Devine Network security 2018 (7), 15-20, 2018 | 43 | 2018 |
Android architecture: attacking the weak points S Mansfield-Devine Network Security 2012 (10), 5-12, 2012 | 43 | 2012 |
DDoS: threats and mitigation S Mansfield-Devine Network Security 2011 (12), 5-12, 2011 | 41 | 2011 |
The imitation game: How business email compromise scams are robbing organisations S Mansfield-Devine Computer Fraud & Security 2016 (11), 5-10, 2016 | 32 | 2016 |
Paranoid Android: just how insecure is the most popular mobile platform? S Mansfield-Devine Network Security 2012 (9), 5-10, 2012 | 30 | 2012 |
Ransomware: the most popular form of attack S Mansfield-Devine Computer Fraud & Security 2017 (10), 15-20, 2017 | 29 | 2017 |
Android malware and mitigations S Mansfield-Devine Network Security 2012 (11), 12-20, 2012 | 29 | 2012 |