The Power Of Smartphones And Radiation

?Research from the University of Lund, Sweden, shows that mobile phones can be used to reveal whether or not you’ve been exposed to radiation

?According to tests, the materials within a phone can be used to analyse radiation levels as many as six years after exposure

?An agreement has been made with the Swedish Radiation Safety Authority to implement the practice and improve emergency planning

?X-Ray protection manufacturer Rothband advises tourists visiting ‘exclusion zones’ on how to protect themselves from radiation

 

X-Ray protection manufacturer Rothband has published an in-depth guide to ‘dark tourism’, lending its insights into the culture of dangerous travel locations and, in particular, areas affected by radiation.

 

According to research conducted by the University of Lund, Sweden, aluminum oxide resistors contained within mobile phones can be analysed for traces of radiation. Radiation levels can be detected for six years from the date of exposure, making this a promising defence against the terror threat and the prevention of ‘dirty bombs’.

 

Rothband has conducted its own research, which reveals almost 70% of people would ‘definitely not’ take their holiday at a site previously affected by radiation. You can see this survey below:

According to Dylan Harris, Managing Director at Lupine Travel, a UK tour company specialising in unique travel destinations, there are some interesting figures regarding how many travel to Chernobyl:

 

“We send around 300 people a year to Chernobyl. The numbers used to be higher but they were really affected by the outbreak of the civil war in Ukraine in 2014. They have recently started to recover though.

 

“We get a wide range of ages visiting Chernobyl, but around 50% of the clients are aged from 20-35.”

 

There are ways those taking a trip to Chernobyl can protect themselves – you can read about them here, in Rothband’s guide.

 

Paul Dixon, Managing Director at Rothband, says the discovery is a great step towards securing safer visiting conditions and radiation safety as a whole:

 

“Technology has always moved quickly with regards to anti-radiation equipment, and this discovery is no exception. Places such as Chernobyl have used similar systems before, but this is much more sophisticated and backed by research.

 

“The statistics from the survey are surprising. Without this discovery alone there are still plenty of ways to stay safe in these kinds of locations, and yet the majority wouldn’t consider it.

 

“I’m sure that with more resources and protective methods the numbers should tip in favour of visiting – there are some great historic locations, and if you are interested in them you shouldn’t be put off.”

 

 

Honda plant hit by WannaCry ransomware attack

 

Reports are surfacing that Honda halted production at one of its vehicle plants for a day this week after finding the WannaCry ransomware that struck globally last month in its computer network. The automaker shut production on Monday at its plant in Japan.

http://brn.firetrench.com

 

Please see below for comments from ESET and One Identity.

Mark James, security specialist at ESET:

“As with most malware, even after the initial impact of a public or global strike, it’s still working its way around the internet looking for victims. In this case when malware uses exploits in common or older versions of Windows, many large manufacturers that use bespoke or embedded systems with software that may not be easily or quickly replaced could be teetering on the edge of disaster frantically trying to protect themselves. It only takes one slip, one email or one web page, from all the hundreds or thousands of employees connected to a network of computers that often has to connect worldwide to enable a smooth global operation.

Of course keeping your systems up to date with the latest updates and patches, and ensuring you have a good regular updating internet security product will help to keep you safe, but educating your staff on the dangers of using the very tools we need them to use for their daily workloads is just as important.”

Andrew Clarke UK director at One Identity:

“Even global, corporate brands are seen to be impacted by WannaCry as illustrated by the news that Honda halted production.

It takes just one vulnerable system to leave the door open.  Having been hit in other plants during May, Honda took steps to protect themselves at the time; but as most of us are now aware it is a continuing battle against emerging threats.  Microsoft, for example, on their regular patch Tuesday update in June patched 96 security vulnerabilities and continued to resolve issues in Windows XP.  It is important in industrial plants, where there are often embedded computer systems, that patches are applied promptly and across all systems.   Often due to the complexity of change, it takes some weeks or months to bring all systems up to date.  And of course it is not just Microsoft that needs patching, all manner of systems need to be assessed and updated.  

Some communication protocols have proven to be very insecure, such as the file sharing server message block SMBV1 which was exploited by the WannaCry ransomware and in fact is being disabled totally from windows 10 later this year.  Elsewhere it is recommended that the SMBV1 protocol be disabled if it is not used operationally.

This latest incident reminds us that our efforts to defend our organisations against emerging threats is continuous.  Regular review of all systems and their communication protocols is necessary and, more importantly, a thorough analysis of access controls.  Ask who has access; what can they access and why do they access?  Often in organisations individuals are provisioned to access systems for short periods and are never deprovisoned, which means over time they get excessive access that can be damaging to the business if misused.   Tools to control and manage overall access are critical.  Malware such as WannaCry takes advantage of gaps in security so to be truly safe requires a continuous and thorough approach which embraces the multiple aspects of cyber security.”

Ford Chip Ganassi Racing Grabs Second Place in GTE Pro at Le Mans 24 Hours

-#67 Ford GT takes second in GTE Pro at the Le Mans 24 Hours in thrilling finish

-Marks second year in a row that Ford Chip Ganassi Racing has made the podium at the legendary event

-The podium earned the #67 team double points toward the 2017 FIA World Endurance Championship title

LE MANS, France, June 18, 2017 – The #67 Ford Chip Ganassi Racing Ford GT of Andy Priaulx (GB), Harry Tincknell (GB), and Pipo Derani (BRA) grabbed the runner-up spot of the 2017 Le Mans 24 Hours at the final corner of the final lap.  Last minute struggles for the second-placed Corvette gave Tincknell the opportunity to pounce at the Ford Chicane and take the place just as the chequered flag fell.

http://brn.firetrench.com

Continue reading