Tag Archive for: effects

Leonardo Prepares To Test Air Launched Effects On AW159 Wildcat Helicopter


Preliminary trials have already been performed and testing on the AW159 is expected by the end of the year.

Leonardo and Anduril Industries completed in December 2022 a number of live trials with Air Launched Effects (ALE) at Predannack Airfield in Cornwall. The tests involved the use of Crewed-UnCrewed Teaming (CUC-T) control software and the ALTIUS-600 drone (produced by Anduril’s subsidiary Area-I), the latter being flight tested for the first time in the United Kingdom.

Leonardo said this trial built upon the September 2020 demonstration when a semi-autonomous UAV from Callen-Lenz Associates integrated into an AW159 helicopter’s mission system, allowing the crew to control the drone from the cockpit as if it was one of the aircraft’s on-board sensors. During the December 2022 trial, the Leonardo / Anduril Industries team was able to evaluate and gather real-world performance data on a range of hardware and software components critical to future collaborative drone capabilities.

The team developed and practiced the drone to aircraft coordination, flight maneuvers, waypoints, loiter positions and overall Command and Control (C2) necessary for multiple aircraft to function together, autonomously. The exercises have boosted the company’s knowledge in CUC-T and ALE data management, laying the groundwork for future, more complex trials.

Leonardo also said the next step will see trials with more drones flying simultaneously at beyond-line-of-sight ranges. This type of trials is considered essential in developing future ALE capabilities. ALEs are also being heavily tested in the United States as part of the Future Vertical Lift “ecosystem” and, specifically, one of crucial pieces of the manned Future Attack Reconnaissance Aircraft.

According to FlightGlobal, Leonardo is working to deploy the ALTIUS-600 from a Wildcat helicopter by the end of the year. Dr Simon Harwood, director capability, Leonardo UK, is hopeful that flight tests can be performed in 2023; the company is “conducting a lot of pre-work clearance trials” to enable later this year “integration of that capability on to the platform to conduct those air trials”, he says to FlightGlobal.

Engineers ready…

Source…

Radiation emitted from mobile towers has no ill effects on human health: Experts


Radiation emitted from mobile towers has no ill effects on human health

Radiation emitted from mobile towers has no ill effects on human health (iStock Representative Image)

Photo : iStock

After conducting in-depth tests on 1532 mobile towers, experts on Thursday said that low-powered, non-ionizing radiation emitted from the cell towers has no ill effects on human health. Officials said that the North East Licensed Service Area (NE-LSA) of the Department of Telecommunications has tested 1532 Base Transceiver Stations (BTS) from April to November this year and all the mobile towers have been found compliant as per DoT norms on electric and magnetic fields radiation.

While addressing a webinar on electromagnetic radiations from mobile towers, Dr Tushar Kant Joshi, Advisor, Ministry of Health and Director, OEM Programme, Centre for Occupational and Environmental Health, assured that “it has been found that low powered, non-ionizing radiation emitted from cell towers have no ill effects on human health”

Referring to the scientific research, Joshi said that it becomes extremely essential to address the spread of misinformation and provide an authentic view of health concerns related to mobile towers. It is also important to be informed that no scientific or medical evidence is available to corroborate the argument used against mobile towers, he pointed out.

Shillong-based Senior Deputy Director General of the North-East LSA Ravi Goel highlighted the need for telecom services in India and pressed on the challenges faced by the stakeholders of the industry.

“We are venturing into an age of hyper-connectivity where the government is making every effort to densify telecom infrastructure and telecom towers as these are the backbone of Indian mobile communications.

“In order to magnify the efforts, it is important that the fear surrounding the theories about ill effects of EMF radiations from mobile towers are addressed factually to dispel such misconceptions,” Goel stated.

Deputy Director General of North-East LSA (Compliance) A.K.Jain said that the government has adopted one of the most stringent emission standards for mobile towers in the world. He said: “We follow norms that are 10 times stricter than what has been prescribed by ICNIRP and recommended by WHO…

Source…

The long-term psychological effects of ransomware attacks


Northwave has conducted scientific research into the psychological effects of a ransomware crisis on both organizations and individuals. The findings reveal the deep marks that a ransomware crisis leaves on all those affected. It also shows how their IT and security teams can turn in disarray long after the crisis itself has passed.

psychological effects ransomware

Key findings on psychological effects of ransomware

“The research reveals how the psychological impact of ransomware attacks can persist on people in affected organizations for a very long time,” explains Organizational Psychologist Inge van der Beijl, Director Behaviour & Resilience at Northwave. “It shows that crisis team members may develop serious symptoms far later. Top management and HRM need to take measures against this, in fact right from the very beginning of the crisis. They are the ones bearing responsibility for the well-being of their staff.”

She continues: “We also discovered how teams haven fallen apart some time after the crisis, with members leaving or staying home on sick-leave. The study reveals that effects can linger throughout the organization. All in all the investigation shows that this invisible impact of a cyber crisis is an issue for the general business management, and certainly also for HRM.”

Northwave regards the response to a cyberattack as occurring in three phases. First comes the actual crisis situation, which evolves into an incident phase after about a week. A plan of action is then in place, and recovery measures are launched. The fire has been largely extinguished after a month or so, with the first (basic) functionalities available again.

Full recovery can take one to two years. Each phase has its specific effects on the minds and bodies of those involved, and by extension, on the organization or parts of it. “In average a company is down for three weeks following a malware attack,” notes Van der Beijl. “But it surprised us that the impact persists for so long afterwards. Psychological issues are still surfacing a year after the actual crisis.”

  • One of every seven employees involved in the attack, either directly or indirectly, exhibits severe enough symptoms several months later,…

Source…

The resounding negative effects of silent patches


The alert from the Zero Day Initiative (ZDI) announcing changes to its disclosure policy for ineffective patches has come at the perfect time. A recent yet alarming trend with silent patches has been brought to the surface, as the reduction in communications surrounding patches has been overlooked for quite some time. As a result, enterprises are losing their ability to accurately estimate the risk in their coordinated vulnerability disclosure (CVD) systems – further harming IT protectors.

The updates to ZDI’s policy are intended to incentivize vendors to correctly patch the first time around and effectively communicate patches to offer an accurate depiction of risk. While the need for shortened patch timelines for the public disclosure of vulnerabilities has become an urgent action, not everyone truly knows the hidden harm of silent patching and where to start.

To better grasp the concerns surrounding the matter, it’s important to understand three main areas: the history behind the silent patch, the repercussions of limiting researchers in the process, and how organizations must respond quickly and efficiently improve their patch rates and avoid long-term consequences.

What to know about the silent patch

To start, most major software vendors were once infamous for sweeping vulnerability reports under the rug, which made it challenging for researchers to report vulnerabilities. Bug reports from researchers were often housed in a quiet, unobserved space until, without notice, their proof-of-concept exploits no longer work. No credit, no explanation, no CVE ID – this was the standard silent patching model.

While this was the norm of a very standard plan – it’s very dangerous today, per the ZDI announcement. In most cases, when it comes to these software patches, many companies were not using exotic packers, nor were they employing anti-forensics. Despite any level of encryption of obfuscation of this patch data, it does eventually need to modify the code on the running software, exposing it to anyone with armed with a debugger and a disassembler. In these instances, there was a high risk for skilled exploit developers to sweep in and take advantage of patch…

Source…