Tag Archive for: successfully

GBT Successfully Concluded Testing of its GEN II Long-Range Radio System



Get inside Wall Street with StreetInsider Premium. Claim your 1-week free trial here.


GEN II Global Communication System is using SDR Technology and is Aimed to Work with GBT’s AI technology

SAN DIEGO, Dec. 01, 2022 (GLOBE NEWSWIRE) — GBT Technologies Inc. ( OTC PINK: GTCH ) (“GBT” or the “Company”), successfully concluded its GEN II long range radio project, which has been assigned an internal code name of “Infinia”. GBT thoroughly tested the system and believes successful results were achieved. The system is targeted to work with GBT’s artificial intelligent technology to enable communication dead zone coverage. GEN II includes voice/data transmission through Software Defined Radio (“SDR”) technology. The system utilizes mobile and base/relay units with the goal of facilitating global wireless communication. SDR communication is a software-controlled radio operation. As a typical wireless system is traditionally operated via hardware using radio modules and related components, SDR technology is a computer controlled wireless system. The Infinia is a data and voice communication system that operates via High Frequency (“HF”) radio waves. Infinia communicates through an ionospheric propagation environment to reach very long distances and is designed to overcome areas where there is no reception or skip zones which is one of the major obstacles in communication system. GBT evaluated Infinia to determine if it is capable for enabling an efficient, programmatical method for dead-zone coverage and believes it achieved successful results. The SDR system analyzes the Earth’s ionospheric conditions according to geographical zones and automatically tunes RF signals and frequencies to achieve continuous, reliable communication regardless of location, rough terrain, time of day, season and weather conditions. GBT plans to continue its research in this domain and will continue searching for commercial applications for the Infinia system.

“We are glad to announce a successful conclusion of the Infinia project. Our testing has revealed that the GEN II version can successfully overcome dead zones using our advanced SDR technology. The Infinia utilizes a base unit…

Source…

TIGTA says IRS successfully prevented ransomware attacks


The Treasury Inspector General for Tax Administration praised the Internal Revenue Service for its successful efforts in fending off possible ransomware attacks.

The report outlined inspectors’ review of IRS policies and procedures related to incident response plan requirements and their consistency with National Institute of Standards and Technology guidance. Inspectors also reviewed IRS policies and procedures related to required alternate storage site and system backup contingency planning controls, and determined they were generally consistent with NIST guidance as well.

Overall, TIGTA inspectors found the IRS plan is in line with NIST best practices, which could be a factor in why there were no successful ransomware attacks against the service prior to June 2022 (the period covered by the review). In fact, according to the report, the use of these procedures was credited with stopping an attempted ransomware attack on IRS systems in May 2022. While certain details were redacted, personnel from the IRS Computer Security Incident Response Center analyzed the website browsing log and identified website traffic patterns consistent with ransomware, and then removed the affected computer from the network. TIGTA compared the details of this incident response report against current policies and procedures and determined that the CSIRC took appropriate actions to resolve the incident.

irs-building-shadows.jpg

TIGTA inspectors also selected four information systems and reviewed the results of annual testing of their Information System Contingency Plans from July 1, 2021, through June 30, 2022. For three of the information systems, TIGTA concluded these systems had effective controls to enable them to be restored in the event of a ransomware attack. The test results for the fourth information system identified unresolved issues related to the failure to back up system data on a daily basis as required. During the TIGTA audit, the IRS corrected these deficiencies by performing daily backups, but system data was at risk for approximately two years until the IRS addressed the deficiencies.

Due to their findings, TIGTA made no recommendations to the IRS in the report. The IRS, as one might imagine, agreed with…

Source…

Security researchers successfully hijack Windows 11’s Power Automate tool


In a nutshell: Windows 11 includes tools to automate repetitive tasks, saving users a lot of time. However, one security researcher says it can also save hackers a lot of time. Microsoft questions the vulnerability of its automation tools, but as usual regarding cybersecurity, human complacency may be the weakest link.

A research firm recently published methods for attackers to hijack automation tools that ship with Windows 11 to distribute malware and steal data across networks. The process comes with some caveats but marks another area of concern for IT security.

The vulnerability centers on Power Automate, a tool Microsoft packages with Windows 11 that lets users automate tedious or repetitive asks across various programs. Users can automatically backup files, convert batches of files, move data between programs, and more, optionally automating actions across groups through a cloud.

Power Automate comes with many pre-made functions, but users can create new ones by recording their actions, which the tool can later repeat. The program could gain widespread use because it requires little-to-no coding knowledge.

Michael Bargury, CTO of security company Zenity, thinks attackers can use Power Automate to more quickly spread malware payloads, explaining how in a June Defcon presentation. He released the code for the attack, called Power Pwn, in August.

Image credit: Windows Report

The biggest obstacle to hacking with Power Automate is the fact that an attacker needs to already have access to someone’s computer or have penetrated a network through other nefarious methods. Bargury told Wired that if an attacker then creates a Microsoft cloud account with administrative privileges, they can use automated processes to push ransomware or steal authentication tokens. Attacks using Power Automate could be harder to detect because it technically isn’t malware and carries an official Microsoft signature.

Microsoft wrote about a 2020 incident in which attackers used a company’s automation tools against it. Windows 11 and Power Automate weren’t around back then, but the case provides a real-world example of the same fundamental technique.

Microsoft claims any fully…

Source…

Cyren Successfully Completes S – GuruFocus.com


McLEAN VA / ACCESSWIRE / August 3, 2022 / Cyren Ltd. (NASDAQ:CYRN), a provider of next-generation email protection and embedded threat detection solutions, today announced that it has completed the previously announced divestment of its legacy secure email gateway business to Content Services Group GmbH for €10,000,000 of gross cash proceeds. The sale will enable Cyren to focus on its core business and strategic growth opportunities to deliver more value to both its customers and shareholders.

“This divestment will improve our balance sheet and allow Cyren to focus on products and market opportunities that will best help us grow our revenues” said Brett Jackson, Cyren’s Chief Executive Officer. “We will concentrate on continuing to build momentum with our enterprise anti-phishing product, Cyren Inbox Security, as well growing our core threat detection business.”

About Cyren

Cyren (NASDAQ:CYRN) protects more than a 1 billion users around the world from sophisticated and emerging email-, malware-, and web-based cyber-attacks every day. Our embedded threat detection, threat intelligence and inbox security solutions help enterprises, service providers, and technology companies prevent breaches and eliminate countless hours of incident response. Learn more at www.cyren.com.

This press release contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. For example, statements in the future tense, and statements including words such as “expect,” “plan,” “estimate,” “anticipate,” or “believe” are forward-looking statements, including statements regarding expectations that Cyren Inbox Security will be the key driver of future growth, expectations regarding developing a high-growth enterprise revenue stream that will materially contribute to Cyren’s results and expectations regarding our products, including Cyren Inbox Security. These statements are based on information available at the time of the press release and the company assumes no obligation to update any of them. The statements in this press release are not guarantees of future performance and actual results could differ materially from…

Source…