Do Parents Do Enough to Protect Children On-line? Not Really, Reveals Study

    New research from Kaspersky Lab and B2B International shows that despite over half (52%) of parents believing that the threats facing their children online are increasing – from cyber-bullying to inappropriate content – not much more than a third (39%) guides their children by talking to them about the potential threats. The survey […]

Read More

Phishing attacks increase

Most people are now aware of one of the hacker’s weapons known as “phishing”, a fairly random form of attack using emails with links to malicious websites infected with malware, or with infected attachments. The rising incidences of cyber-attacks on small and medium sized businesses has seen an increase in one particular variant, known as spear phishing. Spear phishing […]

Read More

Social engineering scams, a growing threat

Social engineering scams are becoming one of the largest sources of revenue for fraudsters and cyber criminals. According to Get Safe Online, the UK Government’s preferred online security advice channel, UK consumers have lost more than £21 million to social engineering scams since the beginning of the year. For example, these scams are where fraudsters […]

Read More

Has your fridge or TV been compromised?

The Internet of Things (IoT) is a “buzz phrase” in our industry at the moment. What does it mean and will this latest technological advance brighten our lives? Let’s start with a typically technical definition from technology research company Gartner: the Internet of Things “is the network of physical objects that contain embedded technology to […]

Read More

Risky cloud, Shadow IT and “watering hole attacks”

Last September we posted a news item about the checks you should make when choosing a cloud provider, with particular emphasis on making sure that the cloud services being evaluated have the pedigree to be in the market for the long run. Last week, California based company Skyhigh Networks released its first European Cloud Adoption […]

Read More

The threat from within

If you have followed CF Systems’ posts and news items you will know that we frequently highlight news of hacking and data breaches – recognised external threats. A recent report from security software vendor IS Decisions has focused our attention on the “threat from within”.  The study, entitled “The Insider Threat Security Manifesto: Beating the […]

Read More

Beware pretty pictures….

A new version of the notorious Zeus banking Trojan has been discovered by research firm Malwarebytes. The malware works by embedding money stealing code inside desirable images, such as classic scenery or sunsets, that victims are tempted to download. The malware then goes to work when the user logs on to the website of one […]

Read More

What is the Fn key and why is it on your keyboard?

You may have noticed a key on your keyboard named “Fn”, this Fn key stands for Function, it can be found on the keyboard along the same row as the space bar near the Crtl, Alt or Shift, but why is it there? Simply put, the Fn key used with the F keys across the top of the […]

Read More