Bittium exhibits Bittium Tough Mobile™ smartphone and other products meant for critical communications at the Critical Communications World event

Oulu, Finland, May 14, 2018 – Bittium exhibits Bittium Tough Mobile LTE smartphone and other products and solutions for critical communications at the Critical Communications World event in Berlin, German on May 15-17. The newest product to be showcased is the Bittium Tough Mobile HybridX™ extension that combines Bittium Tough Mobile smartphone with the functional HybridX accessory. The HybridX accessory is integrated to the Bittium Tough Mobile smartphone and the set is connected to a PMR (Professional Mobile Radio) device, such as TETRA or P25. The extension eases the transition of authorities and security operators, such as police and fire and rescue service, from TETRA or P25 network based voice and messaging solutions to solutions that provide broadband connection.

http://brn.firetrench.com

http://adn.firetrench.com

Continue reading

Malware infected apps return to haunt Google Play Store

Security researchers have discovered a set of malicious apps on the Google Play Store that are reappearing after being removed by simply changing their names. Malware identified as Android.Reputation.1, a Trojan first encountered in 2014, has been found in new iterations of at least seven apps on the Play Store after Google was previously alerted to them.

http://brn.firetrench.com

Continue reading

Research finds increase of personal and IoT devices on enterprise networks a security risk

This morning, a security firm announced the findings of its Internet of Things (IoT) report, which found that an increase in personal IoT devices, such as fitness trackers and virtual assistants, are being connected to corporate networks and putting companies at risk from cyber-attack.

http://brn.firetrench.com

 

Commenting on this, Daniel Moscovici, co-founder of Cy-oT, said “IoT devices are not protected by nature. We need them to improve our businesses and life, but they are a very easy attack surface, and by far the easiest way to get into an organisation, enabling hackers to scan your network, install malware, conduct reconnaissance, and exfiltrate data by bypassing other security mechanisms. The real risk is the fact that these devices are an open door in and out of an organisation. For example, if a hacker is able to infiltrate a video camera, they would be able to steal your pictures and videos; however, this is not the main issue. More importantly, the hacker can reach your more sensitive assets by accessing your network though an insecure device.

“We have seen organisations investing a lot of money in mechanisms to protect their networks, perimeters and endpoints, so attackers will use the path of least resistance in terms of attack surface – connected devices, especially in a wireless environment. However, organisations are unaware that it’s not only the corporate network that is in danger; its airspace is also under threat. Hackers can connect via P2P directly to these assets and, from there, get into the corporate network.

“IoT devices are exposed for multiple reasons. Some of them can have built in vulnerabilities, and are actually shipped from the factory as a hackable device or a ready to use botnet. IoT devices can also be exposed through their cloud or web application services, as these are often not adequately secured. The wireless networks surrounding IoT devices are also highly unprotected; think WPA2 vulnerabilities. Wireless infrastructures are very sensitive, especially where multiple devices from multiple vendors/users are concerned. Some will even be from outside your company walls – for example if an employee takes a company device and connects to a local Starbucks Wi-Fi.

“What is needed is a dedicated cybersecurity solution that monitors both the IoT device and its activity 24 x 7, and can neutralise the threat. By doing this, an organisation will be able to detect when and which devices are at risk, as well as mitigate the threat in real time without physically looking for it. The answer does not lie within the device itself, but with a solution that brings your Security Operations Team visibility and control.”

Airbus CyberSecurity brings its expertise to EU funded Brain-IoT Project

London, 14 May 2018 – A European consortium of twelve industry and academy partners from France, Germany, Italy, Spain and the UK, including Airbus CyberSecurity, has won the approval of the EU Framework Programme for Research and Innovation Horizon 2020 to begin working on Brain-IoT. The focus will be on interoperability and cybersecurity in the context of the Internet of Things (IoT).

http://brn.firetrench.com

Continue reading

Li-ion and Lead-Acid Battery Applications Push Global Battery Materials Market toward $43.2 Billion by 2023

Battery Image.jpg

London, UK. – 14 May, 2018 – China, Japan and South Korea in Asia-Pacific (APAC) are proving to be lucrative markets for Lithium (Li)-ion battery material suppliers, as they host numerous leading Li-ion battery original equipment manufacturers (OEMs). These OEMs prefer their suppliers to be located close to them, as it facilitates supply and customization. North American and European battery material suppliers will establish mass production facilities for Li-ion battery materials in APAC due to low-cost production and the accessibility of raw materials. Frost & Sullivan forecasts the global battery materials market to reach $43.2 billion in 2023, growing at a CAGR of 8.3% through 2023.

http://brn.firetrench.com

Continue reading