EFFECTIVE CYBERSECURITY

Yokohama ADVAN Sport EV tyre to be Introduced in Intl Mkts

Due to COVID-19 pandemic, work-from-home using internet has become a growing way of connecting with associates and clients. This year, internet use has nearly doubled, due to work-from-home and lockdowns. But internet is a risky environment, especially when connecting your mobile devices to a public network. You are at an airport and connect to its public Wi-Fi network. But you are unaware that there is a hacker lurking around the corner, monitoring the internet traffic and ready to hack into your personal account. It is estimated that there are over 450 million public Wi-Fi hotspots globally, offering a rich hunting ground for cyber criminals.  

Cyber specialists tell us that currently there are more than 375 malicious threats PER MINUTE and growing. Mobile malware threats grew by a whopping 70% in Q1-2020 over Q3-2019! Cyber criminals have generated 113,000+ malicious URL’s related to COVID-19, targeting healthcare, education and banking in particular. Cybercriminals steal personal and company information by hacking into our susceptible computers and mobile devices. Cyber-attacks are especially devastating for small businesses - industry data shows that a staggering 60% of small companies, which have been hacked by cyber criminals, go out of business within 6 months after the attack.

While business operations, from conceiving an idea to its final delivery to the user, are going digital at breakneck speed, the entire operational areas remain vulnerable to cyber malfunctioning in one form or other. This impact the operations very hard short-term as well as long-term. Cyber security threats can be due to inherent flaws within the system. But the possibility of deliberate cyber-attacks and hacking from one source or the other is abundant. As competition and market battles hot up, this remains a real danger.

The risk covers a large area. One of the biggest threats is the compromising of vital data. This includes important technical details, hard-earned market information, customer information etc. Loss of data can bring the operation to a halt at great financial impact. As hinted, the problem can be due to malfunctioning of the software or external interference to steal the data.

Either way, the cost of recovery is immense, not to talk about the time lost in the process. Hidden or not, these expenses will have a big role in fixing the final profit and loss accounts.

Adding to this is the loss of credibility of the business. The output will be negatively impacted and the company will have to do great degree of explanations to the customer. It is an equal task to recover lost data and to recover lost credibility. Consumers have other options and look elsewhere. But the company cannot afford that luxury.

While the margin for deliberate external intrusion possibilities remains large, many of these security breaches are caused by human error. One needs to realise that however deep an entity goes digital, there is always that unavoidable human touch that makes it run. AND, to err is human!

This underlines the need for proper intense training. There are studies that say employee ignorance is one of the leading contributors. Workers may know the essential basics of an application, but that does not make him or her a cyber security expert. While the IT departments execute a new cloud computing initiative or new application software, they have to ensure that those handle it on a daily basis are equipped to manage a crisis.

Types of cyber threats

Cyber threats are ever-evolving and cybercriminals use different types of malware to get what they want. Malware is an abbreviated form of “malicious software.” This is software that is specifically designed to gain access to or damage a digital device, usually without the knowledge of the owner.

Crypto jacking: Malware that gives cybercriminals access to “mine” cryptocurrency on your computer, at the expense of your resources.

Form jacking: Malware in which cybercriminals inject malicious code into online forms to steal payment card details on legitimate websites.

Ransomware: It is a malicious software that uses encryption to hold data for ransom, the purpose of which is to extort money from the victims with promises of restoring encrypted data. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking somebody into installing it.

Phishing: These are fake emails that can look surprisingly legitimate. If you get tricked into clicking a link or providing information, thieves can get your passwords and account numbers.

Zoom Bombing: Intruders hack into online meetings.

Remote Access Trojans (RAT): Malware that gives a cybercriminal a “back door” to remotely access a compromised computer.

Spyware: It is unwanted software that infiltrates your device, stealing your Internet usage data and sensitive information. Spyware gathers your personal information and relays it to advertisers, data firms, or external users.

Dark web: It is an underground online community where criminals can go to buy and sell your personal information.

Defense

All digital devices need to be protected using a highly-rated, proven anti-virus program. These programs provide a shield for your operating system in the form of a real-time scanner. When your antivirus program detects an infected file or program, it can delete it on the spot or move it to a special "quarantine" folder. When your antivirus quarantines a file, it prevents it from interacting with the rest of the computer.

A Virtual Private Network (VPN) creates a private network within a broader network, adding security by using encryption and tunneling mechanisms. There are some free VPN products available, but these may trade your information to help offset their costs, or impose other limitations, such as how much VPN data available per month. A paid subscription service may enable you to deploy a powerful, yet easy-to-use VPN that protects your Wi-Fi connections, bandwidth and privacy with guarantees against any losses. These VPN’s work with all digital devices - PCs, Macs, smartphones and tablets.

It goes without saying that users of all digital devices that use Wi-Fi connectivity must become more mindful of cybersecurity needs, and companies must invest in security programs and ongoing employee training.

Enviro Disputes Infiniteria’s Request To Terminate Company Reorganisation

Enviro Disputes Infiniteria’s Request To Terminate Company Reorganisation

Scandinavian Enviro Systems AB (publ) has disputed a request from Infiniteria Sweden AB and Infiniteria Europe Sàrl to terminate the company’s ongoing reorganisation. In a statement submitted to the Gothenburg District Court on 22 April, Enviro argued no grounds exist to end the process, originally approved on 27 February 2026. A creditors’ meeting on 18 March saw no opposition to the reorganisation continuing.

The dispute stems from Enviro’s decision to terminate the joint venture agreements with Infiniteria under Swedish law, calling them burdensome and loss‑making. Infiniteria filed a termination request on 15 April, which Enviro answered on 22 April. Enviro disputes the request and several supporting claims.

Enviro states the joint venture caused its financial difficulties, while its business plan shows opportunities to build a profitable enterprise using its patented technology. Infiniteria has asserted a preliminary damages claim of approximately EUR 84 million, but Enviro notes the claim is unsubstantiated and partially overlaps with ongoing arbitration announced on 6 February.

Enviro points to contractual liability caps, including EUR 3 million in the marketing and agency agreement and EUR 2 million in the license agreement. Infiniteria has not shown why these caps should not apply. Regarding the license agreement under English law, Enviro maintains termination was lawful, meaning Infiniteria’s exclusive right to Enviro’s technology has ceased.

Despite the legal conflict, Enviro reports strong global interest. A North American feasibility study is progressing faster than expected, and licensing dialogues are ongoing with around 10 stakeholders. Enviro remains determined to build long‑term value without the former joint venture’s constraints.

Hankook Tire’s New Film Rewinds Formula E Action To Spotlight EV Tyre Technology

Hankook Tire’s New Film Rewinds Formula E Action To Spotlight EV Tyre Technology

Hankook Tire has released a new brand film titled ‘Formula E Rewind’, inspired by the ABB FIA Formula E World Championship. The company serves as the exclusive tyre supplier for the global all-electric racing series, which is organised by the Fédération Internationale de l’Automobile. The latest cinematic work follows a previous Formula E brand film introduced in April last year.

That earlier production focused on Hankook’s advanced motorsports technologies and research supported by cutting-edge infrastructure. Its high production quality earned a Silver Prize in Sound Design at the Seoul Video Advertising Festival 2025, one of South Korea’s largest advertising awards. The newly unveiled film employs a distinctive rewind visual technique, shifting attention from racing outcomes back to the origin of technology. It emphasises that every race starts with the tyre while promoting the innovative ‘iON’ brand, the world’s first full lineup of electric vehicle tyres.

The film dynamically showcases the next-generation electric racing machine GEN3 Evo, which reaches 322 kilometres per hour and accelerates from zero to 100 kilometres per hour in just 1.86 seconds. It also features the official electric racing tyre ‘iON Race’, delivering a powerful sense of speed. By reconstructing race sequences in reverse, the video creates a fresh narrative that boosts viewer immersion. The slogan ‘Where it all begins’ and a composite logo reinforce Hankook’s positioning as a key Formula E partner.

The brand film will be distributed across Hankook’s owned media platforms, including its global website, YouTube and Instagram, aiming to engage motorsports fans, EV users and future mobility consumers.

Solvay’s Predictive Maintenance Push Gains Speed With Expanded IMI Agreement

Solvay’s Predictive Maintenance Push Gains Speed With Expanded IMI Agreement

Solvay has significantly expanded a global framework agreement with IMI, accelerating the installation of connected industrial sensors throughout its worldwide manufacturing network. Under the extended partnership, IMI remains Solvay’s preferred supplier, with over 5,000 sensors already deployed across 25 sites in 11 countries. The ongoing rollout is enhancing operational reliability and efficiency while simultaneously lowering costs and reducing the company’s environmental impact.

The connected devices, classified as Industrial Internet of Things sensors, continuously monitor vibration and temperature on critical machinery. This real‑time data allows Solvay teams to track asset performance, prevent unexpected breakdowns, and schedule maintenance precisely when needed. The group intends to expand the sensor network to 9,000 units by 2027, reinforcing its shift from traditional time‑based maintenance to a predictive, data‑driven approach.

This sensor initiative is central to Solvay’s Essential for Generations strategy, which prioritizes operational excellence and sustainability. By leveraging real‑time information, the company predicts equipment failures, cuts repair expenses, and limits energy losses and waste. Having scaled from just a few hundred sensors in 2023 to more than 5,000 installed globally, Solvay is building a more resilient and reliable industrial footprint across all regions.

Lanny Duvall, Chief Operations Officer at Solvay, said “Digitalisation is reshaping the way we run our plants. Expanding the use of connected sensors helps us make quicker and better-informed decisions that improve safety, reliability and energy efficiency – while also making our operations more competitive and cost‑effective. It’s a concrete accelerator of the operational excellence transformation we’re driving across Solvay as part of our Essential for Generations strategy.”

Diana Garcia, Global Business Development Manager, Digital Products at IMI, said, “The complexity of modern plant operations, coupled with constant pressure on margins, means the chemical industry cannot rely on manual inspections to ensure maintenance operations are efficient and effective. Our technology provides realtime insights that support Solvays move towards predictive maintenance. We are pleased to deepen this successful collaboration.”

Nexen Tire America Outlines Early-Stage Collaboration As New Standard For OE Tyres

Nexen Tire America Outlines Early-Stage Collaboration As New Standard For OE Tyres

Nexen Tire America has detailed how original equipment tyre development has shifted from a standalone process to an integrated engineering effort conducted alongside new vehicle design. The company explains that modern vehicle complexity, driven by electrification and advanced driver systems, requires tyre engineering to begin in parallel with suspension, chassis and electronic control development. This earlier collaboration allows tyre performance to be optimised for hybrid and electric vehicle demands such as noise reduction, load capacity and rolling resistance.

Aaron Neumann, Head of the Nexen Tire America Technical Center, describes how suppliers must now adopt faster development cycles and deeper technical collaboration. The traditional model of selecting off-the-shelf tyres has been replaced by purpose-built designs tuned to specific safety, handling and efficiency targets. Electric vehicles have added further criteria including range optimisation and tyre noise mitigation.

To manage these demands, Nexen has expanded its use of simulation and modelling technologies. Finite element analysis and data-driven tyre modelling allow engineers to evaluate performance early in the development cycle, reducing the number of physical prototypes required. Despite this digital focus, physical testing remains extensive and includes laboratory procedures such as high-speed endurance, rolling resistance, uniformity, noise and flat-spotting assessments.

On-road validation involves instrumented traction and braking tests, ride and handling evaluations, treadwear analysis and durability testing across varied surfaces and climates. Each tyre’s tread pattern, construction, footprint and profile are refined through iterative testing specific to the target vehicle. While some materials overlap with replacement tyres, original equipment fitments are engineered to balance performance, efficiency and comfort.

Over the past decade, Nexen Tire has more than doubled its original equipment portfolio in North America. This growth is attributed to an engineer-to-engineer collaboration model emphasising transparency and responsiveness. Many technologies developed for original equipment programmes, including advanced compounds and tread designs, are later incorporated into replacement tyres.

For consumers, these behind-the-scenes engineering efforts result in tyres more precisely matched to vehicle performance. Neumann notes that modern tyres rank among the most complex vehicle components, having to deliver safety, efficiency and comfort simultaneously across a wide range of conditions, even if that complexity remains largely invisible to drivers.