Due to COVID-19 pandemic, work-from-home using internet has become a growing way of connecting with associates and clients. This year, internet use has nearly doubled, due to work-from-home and lockdowns. But internet is a risky environment, especially when connecting your mobile devices to a public network. You are at an airport and connect to its public Wi-Fi network. But you are unaware that there is a hacker lurking around the corner, monitoring the internet traffic and ready to hack into your personal account. It is estimated that there are over 450 million public Wi-Fi hotspots globally, offering a rich hunting ground for cyber criminals.
Cyber specialists tell us that currently there are more than 375 malicious threats PER MINUTE and growing. Mobile malware threats grew by a whopping 70% in Q1-2020 over Q3-2019! Cyber criminals have generated 113,000+ malicious URL’s related to COVID-19, targeting healthcare, education and banking in particular. Cybercriminals steal personal and company information by hacking into our susceptible computers and mobile devices. Cyber-attacks are especially devastating for small businesses - industry data shows that a staggering 60% of small companies, which have been hacked by cyber criminals, go out of business within 6 months after the attack.
While business operations, from conceiving an idea to its final delivery to the user, are going digital at breakneck speed, the entire operational areas remain vulnerable to cyber malfunctioning in one form or other. This impact the operations very hard short-term as well as long-term. Cyber security threats can be due to inherent flaws within the system. But the possibility of deliberate cyber-attacks and hacking from one source or the other is abundant. As competition and market battles hot up, this remains a real danger.
The risk covers a large area. One of the biggest threats is the compromising of vital data. This includes important technical details, hard-earned market information, customer information etc. Loss of data can bring the operation to a halt at great financial impact. As hinted, the problem can be due to malfunctioning of the software or external interference to steal the data.
Either way, the cost of recovery is immense, not to talk about the time lost in the process. Hidden or not, these expenses will have a big role in fixing the final profit and loss accounts.

Adding to this is the loss of credibility of the business. The output will be negatively impacted and the company will have to do great degree of explanations to the customer. It is an equal task to recover lost data and to recover lost credibility. Consumers have other options and look elsewhere. But the company cannot afford that luxury.
While the margin for deliberate external intrusion possibilities remains large, many of these security breaches are caused by human error. One needs to realise that however deep an entity goes digital, there is always that unavoidable human touch that makes it run. AND, to err is human!
This underlines the need for proper intense training. There are studies that say employee ignorance is one of the leading contributors. Workers may know the essential basics of an application, but that does not make him or her a cyber security expert. While the IT departments execute a new cloud computing initiative or new application software, they have to ensure that those handle it on a daily basis are equipped to manage a crisis.
Types of cyber threats
Cyber threats are ever-evolving and cybercriminals use different types of malware to get what they want. Malware is an abbreviated form of “malicious software.” This is software that is specifically designed to gain access to or damage a digital device, usually without the knowledge of the owner.
Crypto jacking: Malware that gives cybercriminals access to “mine” cryptocurrency on your computer, at the expense of your resources.
Form jacking: Malware in which cybercriminals inject malicious code into online forms to steal payment card details on legitimate websites.
Ransomware: It is a malicious software that uses encryption to hold data for ransom, the purpose of which is to extort money from the victims with promises of restoring encrypted data. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking somebody into installing it.
Phishing: These are fake emails that can look surprisingly legitimate. If you get tricked into clicking a link or providing information, thieves can get your passwords and account numbers.
Zoom Bombing: Intruders hack into online meetings.
Remote Access Trojans (RAT): Malware that gives a cybercriminal a “back door” to remotely access a compromised computer.
Spyware: It is unwanted software that infiltrates your device, stealing your Internet usage data and sensitive information. Spyware gathers your personal information and relays it to advertisers, data firms, or external users.
Dark web: It is an underground online community where criminals can go to buy and sell your personal information.
Defense
All digital devices need to be protected using a highly-rated, proven anti-virus program. These programs provide a shield for your operating system in the form of a real-time scanner. When your antivirus program detects an infected file or program, it can delete it on the spot or move it to a special "quarantine" folder. When your antivirus quarantines a file, it prevents it from interacting with the rest of the computer.
A Virtual Private Network (VPN) creates a private network within a broader network, adding security by using encryption and tunneling mechanisms. There are some free VPN products available, but these may trade your information to help offset their costs, or impose other limitations, such as how much VPN data available per month. A paid subscription service may enable you to deploy a powerful, yet easy-to-use VPN that protects your Wi-Fi connections, bandwidth and privacy with guarantees against any losses. These VPN’s work with all digital devices - PCs, Macs, smartphones and tablets.
It goes without saying that users of all digital devices that use Wi-Fi connectivity must become more mindful of cybersecurity needs, and companies must invest in security programs and ongoing employee training.
Fornnax Annual Meet 2026 Celebrates 100% Achievement And Bold 2030 Vision
- By TT News
- April 27, 2026
FORNNAX TECHNOLOGY PVT LTD recently convened its Fornnax Annual Meet 2026, a landmark gathering that celebrated the organisation’s complete achievement of its targets. The event brought together top professionals from across the company for a day focused on leadership development, recognition of excellence and strategic planning. The atmosphere was marked by a shared sense of pride and purpose, with activities ranging from intensive leadership sessions to an emotional award ceremony and a vibrant celebration reflecting the firm’s core spirit.
The keynote address was delivered by Director and CEO Jignesh Kundaria, who traced the company’s journey from its earliest days without a formal blueprint to its current status as a globally recognised multi-division original equipment manufacturer. Kundaria spoke of building the enterprise through relentless determination and engineering excellence, emphasising that Indian-made machinery could set worldwide standards. His narrative highlighted grit and growth, weaving together humble origins with the firm’s present stature as an internationally respected brand.
Kundaria also presented a detailed review of Fornnax’s major recent accomplishments, including the launch of the R-MAX3300, described as the world’s largest secondary shredder. This engineering breakthrough demonstrates the company’s ability to lead at the highest levels of industrial performance. Additionally, he showcased the development of Fornnax’s largest New Product Development centre and demo plant, a facility designed to accelerate innovation and allow customers to experience solutions at full operational scale. A new state-of-the-art manufacturing facility was also unveiled, aimed at boosting capacity and meeting rising global demand.
A defining segment of the annual meet involved forward-looking roadmaps presented by heads of four key functional pillars. The Head of Sales outlined an ambitious market expansion strategy for deeper geographical penetration and customer-centric growth. The Design Department head focused on accelerating product development cycles and expanding differentiated solutions. The Production Department leader presented plans for capacity optimisation and quality enhancement using the new facility. Meanwhile, the Project and E&I Department head detailed strategies to strengthen project execution and reduce delivery timelines. The Service Department head committed to building a responsive post-sales ecosystem with faster turnaround times and proactive maintenance support.
The event also featured leadership training sessions that encouraged ownership and accountability among participants. An awards ceremony recognised individuals and teams who had driven the company’s complete achievement, with each honour reflecting real effort and tangible results. The gathering served as a reminder that behind every milestone are people who refused to settle for mediocrity.
All departmental roadmaps collectively converge on an ambitious financial target: achieving INR 5 billion in revenue by 2030. The Fornnax Annual Meet 2026 thus stood as both a celebration of past performance and a strategic launchpad for future growth, underscoring the organisation’s commitment to innovation, operational excellence, and customer-centric engineering on a global scale.
Zeon To Showcase Speciality Chemical Expertise At Chemspec Europe 2026
- By TT News
- April 27, 2026
Zeon has confirmed its participation at Chemspec Europe, the premier international exhibition for fine and speciality chemicals, taking place in Cologne from 6 to 7 May 2026. The event gathers global manufacturers, suppliers and industry experts to foster connections and explore innovations across the chemical value chain.
At the trade fair, Zeon aims to engage with both current and potential partners. Discussions will centre on pressing challenges and future trends within the speciality chemicals sector while also identifying fresh avenues for collaboration and technological advancement.
Attendees of Chemspec are invited to visit Zeon for an exchange of ideas. The company’s representatives will be located at Booth D89 within Hall 8, ready to discuss opportunities and industry developments in person.
NEXEN TIRE Secures Original Equipment Supply For 2026 Jeep Cherokee Hybrid
- By TT News
- April 27, 2026
NEXEN TIRE has secured a role as an original equipment supplier for the 2026 Jeep Cherokee, which introduces Stellantis’ first hybrid system. The new Cherokee is estimated to achieve 37 miles per gallon and travel over 500 miles on a single tank of fuel.
The tyre chosen for this model is NEXEN’s ROADIAN GTX, engineered specifically for SUVs and crossover vehicles. Its advanced compound maintains stable braking performance across both summer and winter conditions, while an optimised tread pattern enhances stopping power on dry and snowy roads. Improved mileage extends replacement intervals, and a zigzag tread design distributes road pressure evenly to prevent sudden load shifts, thereby increasing driving stability. Additional benefits include low noise, snow traction and overall ride comfort.

Having already been selected as original equipment for multiple SUV models from global automakers, the ROADIAN GTX demonstrates the quietness and driving stability required for hybrid SUVs. Its technology suite meets the specific demands of electrified vehicles, reinforcing NEXEN TIRE’s reputation for quality and performance in the original equipment market.
“By supplying OE tyres for Jeep’s first hybrid SUV in North America, we have once again demonstrated our competitiveness in the future mobility market. We will continue to strengthen our supply to global automakers through ongoing R&D and strong partnerships,” a NEXEN TIRE official said.
Enviro Disputes Infiniteria’s Request To Terminate Company Reorganisation
- By TT News
- April 25, 2026
Scandinavian Enviro Systems AB (publ) has disputed a request from Infiniteria Sweden AB and Infiniteria Europe Sàrl to terminate the company’s ongoing reorganisation. In a statement submitted to the Gothenburg District Court on 22 April, Enviro argued no grounds exist to end the process, originally approved on 27 February 2026. A creditors’ meeting on 18 March saw no opposition to the reorganisation continuing.
The dispute stems from Enviro’s decision to terminate the joint venture agreements with Infiniteria under Swedish law, calling them burdensome and loss‑making. Infiniteria filed a termination request on 15 April, which Enviro answered on 22 April. Enviro disputes the request and several supporting claims.
Enviro states the joint venture caused its financial difficulties, while its business plan shows opportunities to build a profitable enterprise using its patented technology. Infiniteria has asserted a preliminary damages claim of approximately EUR 84 million, but Enviro notes the claim is unsubstantiated and partially overlaps with ongoing arbitration announced on 6 February.
Enviro points to contractual liability caps, including EUR 3 million in the marketing and agency agreement and EUR 2 million in the license agreement. Infiniteria has not shown why these caps should not apply. Regarding the license agreement under English law, Enviro maintains termination was lawful, meaning Infiniteria’s exclusive right to Enviro’s technology has ceased.
Despite the legal conflict, Enviro reports strong global interest. A North American feasibility study is progressing faster than expected, and licensing dialogues are ongoing with around 10 stakeholders. Enviro remains determined to build long‑term value without the former joint venture’s constraints.



Comments (0)
ADD COMMENT