Contact
(877) 747-7959
info@sofiaitc.com

News

Traveling with a Laptop / Surviving a Laptop Ban: How to Let Go of "Precious", (Mon, May 29th)

For a few months now, passengers on flights from certain countries are no longer allowed to carry laptops and other larger electronic devices into the cabin. Many news media reported over the last weeks that this policy may be expanded to flight from Europe, or to all flights entering the US. But even if you get to ...

Keep your friends close and your enemies closer (IT Toolbox Blogs)

As Windows machines fall prey to crytptolocker, and the talk is all about viruses, malware, and ransomware, mainframe users are often fairly smug about just how secure their mainframes are. How products like RACF, CA-ACF2, and CA-TopSecret keep data safe, and all the cyber security they need is already in place. But a survey from Compuware last month shows ...

Scaling up Cybersecurity (InfoRiskToday)

Breach Preparedness , Cybersecurity , Data BreachImperva CTO Shulman on How Security Leaders Can Rise up to Meet Today's Top Adversaries Tom Field (SecurityEditor) • June 25, 2017     Amichai Shulman, CTO, Imperva As threat actors refine their attacks and their automation, prospective ...

Crash Override And How Cyberwarfare Is Bringing Conflict To The Homefront (Forbes)

Power transmission lines. (Steve Hockstein/Bloomberg) As I wrote this past February, one of the major undercurrents of the latest edition of the Tallinn Manual was the transition ...

UK Parliament Cuts Email Access After Cyberattack (SecurityWeek)

Britain's parliament shut down external access to e-mail accounts on Saturday following a cyberattack. Parliamentary authorities described the attack as "sustained and determined", in an email sent to lawmakers and published by the Daily Telegraph. "Earlier this morning we discovered unusual activity and evidence of an attempted cyberattack on our computer network," it read. "Closer investigation by our team confirmed that hackers were ...

Social Media Integration: Overcoming Instagram's Limitations (IT Toolbox Blogs)

Once you’ve conquered the basic challenge of ERP and CRM implementation and integration, your users are going to start approaching the IT department for help with marketing automation and social media integration. Everybody has an API, but the fun just begins there. Consider the case of Instagram. Let’s face it. Instagram is fairly picky about who ...

One-fifth of today's enterprise applications were born in the cloud, surveys suggest (ZDNet)

To date, the motis operandi of cloud implementations has been to apply the cloud-first principle to any and all new projects, applications or workloads, while leaving on-premises as is. In other words, cloud adoption grows in proportion through gradual attrition of on-premises systems. Therefore, it's only a matter of cycles before the number of cloud-first generation workloads and systems outnumbers ...

Microsoft's Windows 10 Shared Source Kit code leaks (ZDNet)

Some of Microsoft's Windows 10 source code was leaked earlier this week, but the potential damage from the breach may be limited, based on various reports. The Reigster first noted on June 23 that up to 32TB of "official and non-public (Windows 10) installation images" were uploaded to BetaArchive.com. (BetaArchive calls ...

SamSam Increases Ransom Demand to $33,000 (SecurityWeek)

In newly observed attacks, the SamSam ransomware that has been active for more than a year is demanding a whopping $33,000 to decrypt all affected machines in a network. SamSam isn’t distributed through automated tools such as exploit kits or spam botnets, as most ransomware families out there, but is installed on vulnerable systems through manual compromise instead. Once ...

CIA Knew in August that Putin Sought to Boost Trump: Report (SecurityWeek)

The CIA had top-level intelligence last August that Russian President Vladimir Putin personally ordered an operation to help Donald Trump win the US presidential race, the Washington Post reported Friday. The intelligence shocked the White House and put US security chiefs on a top-secret crisis footing to figure out how to react. But amid confidence that Democrat Hillary Clinton still had the ...

Finally, The Perfect Dating App For Superfans, Stalkers, And Serial Killers (Forbes)

Courtesy Dating.ai Dating.ai lets users scour big dating sites for particular faces in the crowd. For generations, technology has ...

Anthem to shell out $115m in largest-ever data theft settlement (The Register)

Good day to be an attorney, or a Maserati salesman Health insurer Anthem has today agreed to pay $115m to settle a class-action suit brought on by its 2015 cyber-theft of 78.8 million records. The settlement fund will be used to cover damage costs incurred by people who had personal information including their names, dates of birth, addresses, and medical ID numbers ...

AES-256 crypto cracked in 50 secs using 200 of kit one metre away (The Register)

Van Eck phreaking getting surprisingly cheap Sideband attacks that monitor a computer's electromagnetic output to snaffle passwords are nothing new. They usually require direct access to the target system and a lot of expensive machinery – but no longer. Researchers at Fox‑IT have managed to crack AES (Advanced Encryption Standard) 256 encryption keys from a distance of 1 metre (3.3 feet) – ...

$115 Million Settlement in Massive Anthem Breach Case (InfoRiskToday)

Breach Response , Data Breach , Risk AssessmentsLargest Data Breach Settlement Ever, Pending Court Approval, Lawyers Say Marianne Kolbasuk McGee (HealthInfoSec) • June 23, 2017     Health insurer Anthem has agreed to a proposed $115 million deal ...

The Weaponization of DDoS (InfoRiskToday)

DDoS , DDoS Attacks , MitigationArbor's Darren Anstee on How to Defend Against Powerful DDoS for Hire Tom Field (SecurityEditor) • June 23, 2017     The Mirai botnet is just the most high-profile example of the new weaponization of DDoS. Attacks ...

CISO Thom Langford on Risk and Awareness (InfoRiskToday)

Awareness & Training , Education , GovernanceHow to Gauge Your Organization's Risk Appetite and Improve Security Training Tom Field (SecurityEditor) • June 23, 2017     Publicis Groupe CISO Thom Langford discusses how best to measure your organization's true ...

US Secretary of State: (The Register)

Pish, hackers, smackers, says Rex Tillerson Analysis US Secretary of State Rex Tillerson has expressed a willingness to work directly with Russia on cybersecurity and other issues. The proposed partnership is surprising, given the continued controversy over allegations that the Russians interfered with last year's US presidential election – a serious accusation at the center of an ...

AMD Will Take Server Market Share From Intel With EPYC, It's Just A Matter Of How Much (Forbes)

AMD’s server platform launch event this week in Austin, TX was indeed EPYC in more ways than one. All puns aside and with appropriate amounts of “I’ll believe it when I see it” skepticism mixed in for good measure, the company’s Naples platform architecture, ...

Obama reportedly ordered hacking operation targeting key Russian networks (ArsTechnica)

EnlargeWikimedia Commons/Maria Joner reader comments 10 Share this story In his final days as the 44th president of the United States, Barack Obama authorized a covert hacking operation to implant attack code in sensitive Russian networks. The revelation came in an

32TB of Windows 10 internal builds, core source code leak online (The Register)

Finding exploitable bugs suddenly easier Exclusive A massive trove of Microsoft's internal Windows operating system builds and chunks of its core source code have leaked online. The data – some 32TB of installation images and software blueprints that compress down to 8TB – were uploaded to betaarchive.com, the latest load of files provided just earlier this week. It is believed the ...

Not Apr 1: Google stops scanning your Gmail to sling targeted ads at you (The Register)

Given the amount of data it already has on you, why bother? Google has said it will no longer scan the content of Gmail messages to sell targeted adverts to users of the free service. The Chocolate Factory made the announcement in a blog post on Friday touting the success of its G Suite, the cloud apps service for business. G Suite is ad-free ...

Vault7 leak: Brutal Kangaroo toolkit. Data breach and ransomware updates. Notes on code audit requirements.

Download Audio

Risks, Threats and Adversaries: How to Prioritize (InfoRiskToday)

CybersecurityJames Lyne of Sophos on Finding the Right Security Posture Tom Field (SecurityEditor) • June 23, 2017     James Lyne of Sophos From nation-states to organized crime and malicious insiders, organizations are under siege from a variety of adversaries and threats. ...

Traditional or Convertible – Two Common Laptop Types Explained (IT Toolbox Blogs)

Traditionally, laptops had only one function. They were, well, just laptops: the lid was opened, revealing the screen to look at and keyboard to type with. This was the norm of mobile computing until a few years back, when new kind of laptops started to pop up in the marketplace. These computers were, and still are, called convertible or 2-in-1 ...

GreatHorn Secures $6.3 Million Combat Spear-Phishing Attacks (SecurityWeek)

Belmont, Mass-based start-up GreatHorn announced Wednesday completion of a $6.3 million Series A funding round led by Techstars Venture Capital Fund and .406 Ventures.  The firm, one of Gartner's 'cool cloud vendors', is bringing machine-learning technology to the continuing threat and problem of targeted spear phishing. Spear-phishing, and the related Business E-mail Compromise (BEC) scam, are two of today's most pernicious ...

SofiaITC sign up form


Thank you for signing up for SofiaITC's Newsletter and Articles.

SofiaITClogin form