The threat of pirated apps from rogue app stores for your iPhone or iPad

Have you heard the phrase “walled garden”? In an IT context it means an environment where the service provider has control over content and applications and restricts access for that which is non-approved. Apple has been famous for the walled garden that is it’s App Store, apps on the store have largely been seen as […]

Read More

The risk of external threats can mask internal perils

  Low tech methods of capturing sensitive and confidential information can put a company at risk of a much larger data breach. A 2015 study has shown that “visual hacking” is a significant threat. The Ponemon Institute conducted a visual hacking experiment on behalf of 3M Company and the Visual Privacy Advisory Council (VPAC) using computer […]

Read More

Are your children online gaming? Safety is important

Christmas is over, the schools are still on holiday and your children may well be whiling away their time by online gaming. Although this is perfectly harmless, they may well be potential targets for cyber criminals drawn by the opportunity to gain credit card and other useful information. They may be using secured gaming platforms […]

Read More

Do Parents Do Enough to Protect Children On-line? Not Really, Reveals Study

    New research from Kaspersky Lab and B2B International shows that despite over half (52%) of parents believing that the threats facing their children online are increasing – from cyber-bullying to inappropriate content – not much more than a third (39%) guides their children by talking to them about the potential threats. The survey […]

Read More

Phishing attacks increase

Most people are now aware of one of the hacker’s weapons known as “phishing”, a fairly random form of attack using emails with links to malicious websites infected with malware, or with infected attachments. The rising incidences of cyber-attacks on small and medium sized businesses has seen an increase in one particular variant, known as spear phishing. Spear phishing […]

Read More

Social engineering scams, a growing threat

Social engineering scams are becoming one of the largest sources of revenue for fraudsters and cyber criminals. According to Get Safe Online, the UK Government’s preferred online security advice channel, UK consumers have lost more than £21 million to social engineering scams since the beginning of the year. For example, these scams are where fraudsters […]

Read More

Has your fridge or TV been compromised?

The Internet of Things (IoT) is a “buzz phrase” in our industry at the moment. What does it mean and will this latest technological advance brighten our lives? Let’s start with a typically technical definition from technology research company Gartner: the Internet of Things “is the network of physical objects that contain embedded technology to […]

Read More

Risky cloud, Shadow IT and “watering hole attacks”

Last September we posted a news item about the checks you should make when choosing a cloud provider, with particular emphasis on making sure that the cloud services being evaluated have the pedigree to be in the market for the long run. Last week, California based company Skyhigh Networks released its first European Cloud Adoption […]

Read More

The threat from within

If you have followed CF Systems’ posts and news items you will know that we frequently highlight news of hacking and data breaches – recognised external threats. A recent report from security software vendor IS Decisions has focused our attention on the “threat from within”.  The study, entitled “The Insider Threat Security Manifesto: Beating the […]

Read More

Beware pretty pictures….

A new version of the notorious Zeus banking Trojan has been discovered by research firm Malwarebytes. The malware works by embedding money stealing code inside desirable images, such as classic scenery or sunsets, that victims are tempted to download. The malware then goes to work when the user logs on to the website of one […]

Read More