Tag Archive for: Includes

Save on a bundle deal that includes a private phone line and top-rated VPN


Deal pricing and availability subject to change after time of publication.

TL;DR: Stay on top of your data security with the Lifetime Mobile Privacy and Security Subscription Bundle. As of July 18, get it for only $29.99 — a 91% savings.


For a limited time, you can get a Hushed Private Phone Line and a lifetime subscription to KeepSolid VPN bundled together for just $29.99.

The Hushed Private Phone Line lets you set up a second secure phone number while keeping your real number hidden. You can choose from hundreds of different area codes across the U.S. and Canada, and your plan includes a yearly usage of 6,000 SMS or 1,000 call minutes that automatically renews each year.

The lifetime subscription to KeepSolid VPN gives you security and anonymity online with no speed or bandwidth limits. Break down geographical barriers for apps like Netflix, BBC iPlayer, Hulu, and more, all while enjoying military-grade AES 256-bit encryption.

At full price, you’d pay $349 for both apps. But, for a limited time, you can save hundreds with this bundle deal and pay just $29.99 for a lifetime subscription to both.

The Lifetime Mobile Privacy and Security Subscription Bundle — $29.99

Credit: KeepSolid

Source…

Zero-day software issues are growing in number and seriousness (Includes interview)


In addition, the company said it’s “imperative” that organizations using its Email Security hardware appliances, virtual appliances, or software installations on Microsoft Windows Server machines immediately upgrade to a patched version.

Details about the nature of the vulnerability have not been made public to prevent other threat actors from studying it and launching their own attacks.

Looking at this issue for Digital Journal is Troy Gill, Threat Hunter and Security Research Manager at Zix I AppRiver.

Troy Gill places the latest incident in the context of other major security breaches. Here he notes: “The SonicWall hack is just one the latest in a string of zero-day vulnerabilities targeting email security solutions.”

A zero-day refers to a computer-software vulnerability which is unknown to those who should be interested in its mitigation. This often applies to newly released software. The danger is that until the vulnerability is mitigated, hackers can exploit it to adversely affect programs, data, additional computers or a network.

Gill continues: “For customers and others impacted by any zero-day vulnerabilities, it is imperative that security teams not only complete the necessary solution patching, but that they also conduct a security audit in order to identify, isolate, and mitigate any additional threats.”

Gill outlines some of the things that can be done. Recommendations include: “Changing admin rights and user passwords, and implementing multi-factor authentication should also be built into organizations’ best practices and incident response recovery plans.”

Looping back to the incident at hand, Gill states: “The SonicWall attack is also a proof point for organizations still using legacy, on-premise solutions or applications that have reached end-of-life to consider migrating to newer, more secure solutions in the cloud with auto patching capabilities.”

Gill ends by suggesting: “A final best practice would be the implementation of a backup solution so in the event of a compromise, you can still access your business critical data.”

Source…

Warning over malicious Clubhouse invites (Includes interview)


For some, to receive a Clubhouse invite would be something special and it will be tempting to click on a link embedded in an email. The main focus of fraudulent activity has been to use words and phrases to encourage people to click on the malicious link, according to a new report. Cyber-criminals are tapping into the popularity surrounding the latest social media offering. Part talkback radio, part conference call, part Houseparty, Clubhouse is a social networking app based on audio-chat. Users can listen in to conversations, interviews and discussions between different people on various topics.

Looking at this issue from the cybersecurity perspective is OneSpan’s mobile security expert Sam Bakken.

Bakken tells Digital Journal that downloading anything comes with a high level of risk, noting: “It is important for consumers to only download mobile apps from official app stores.” In other words, do not click on email links – if you’re invited to will still be able to join via the official app.

There is a growing tendency among cyber-criminalsto connect something people want, drawing upon psychological factors designed to encourage people to take an interest. Bakken says: “Criminals are very good at taking advantage of our anticipation, so be careful not to let your guard down.”

As to what needs to be done, Bakken outlines three recommendations: “First, it’s time for all financial services apps to integrate biometric authentication.” This offers a more robust means of protection for users.

With his second recommendation, Bakken puts forwardsa low-trust approach, for users to keep in mind: “This mobile banking Trojan has SMS-grabbing capabilities and at this point I view authentication codes sent via SMS as security threat.”

Thirdly, Bakken recommends: “Banks can take additional steps to protect their users against overlay attacks and other mobile vulnerabilities with app shielding. This is an advanced mobile app security that travels with the banking app, designed to protect users against mobile banking threats similar to the Clubhouse one.”

Source…

GBT’s Long-Range Radio Prototype Design Includes Thermal Control System Other OTC:GTCH


SAN DIEGO, March 25, 2021 (GLOBE NEWSWIRE) — GBT Technologies Inc. (OTC PINK: GTCH) (“GBT” or the “Company”), the design of its long range radio prototype design incorporates a thermal control system for efficient heat dissipation. Advanced thermal engineering efforts are invested to ensure reliable operation of the Infinia radio system. The design includes a forced air-cooling system that includes special intake, outtake and fanning components to maintain optimal operational temperature. The design includes a customized heat dissipating heat sink to be mounted within each component enclosure, with a specific orientation and shape. A unique cooling airflow path is designed to efficiently provide forced air venting keeping the circuitries at an optimal temperature. The design of the system contemplates taking into consideration the ambient air temperatures to enable efficient operations in hot regions around the world. A comprehensive design was developed to determine the thermal conditions for the radio transceivers within the mobile, base and repeater units. Experimental techniques and numerical simulations were used to study the various thermal paths to develop the optimal cooling airflow. The power and thermal management of the Infinia system are directly correlated to yield an optimal solution. A concurrent plant including topology, size and control optimization will be apply to both power and thermal domains to ensure reliability and high performance. An optimized thermal system is crucial especially if the system is targeted to be used for emergency and military applications worldwide.

“We have invested major efforts in the design of the Infinia long range radio thermal engineering aspects since they are crucial for its reliability and performance. As high-power circuits and components are producing high heat, it is essential to ensure an efficient cooling system to maintain optimal working conditions, ensuring reliable operation especially in hot areas around the world. Electronic components may get hot and a key factor for their reliable operation is an efficient heat dissipation system. Therefore, an early stages thermal engineering efforts were made to…

Source…