Due to COVID-19 pandemic, work-from-home using internet has become a growing way of connecting with associates and clients. This year, internet use has nearly doubled, due to work-from-home and lockdowns. But internet is a risky environment, especially when connecting your mobile devices to a public network. You are at an airport and connect to its public Wi-Fi network. But you are unaware that there is a hacker lurking around the corner, monitoring the internet traffic and ready to hack into your personal account. It is estimated that there are over 450 million public Wi-Fi hotspots globally, offering a rich hunting ground for cyber criminals.
Cyber specialists tell us that currently there are more than 375 malicious threats PER MINUTE and growing. Mobile malware threats grew by a whopping 70% in Q1-2020 over Q3-2019! Cyber criminals have generated 113,000+ malicious URL’s related to COVID-19, targeting healthcare, education and banking in particular. Cybercriminals steal personal and company information by hacking into our susceptible computers and mobile devices. Cyber-attacks are especially devastating for small businesses - industry data shows that a staggering 60% of small companies, which have been hacked by cyber criminals, go out of business within 6 months after the attack.
While business operations, from conceiving an idea to its final delivery to the user, are going digital at breakneck speed, the entire operational areas remain vulnerable to cyber malfunctioning in one form or other. This impact the operations very hard short-term as well as long-term. Cyber security threats can be due to inherent flaws within the system. But the possibility of deliberate cyber-attacks and hacking from one source or the other is abundant. As competition and market battles hot up, this remains a real danger.
The risk covers a large area. One of the biggest threats is the compromising of vital data. This includes important technical details, hard-earned market information, customer information etc. Loss of data can bring the operation to a halt at great financial impact. As hinted, the problem can be due to malfunctioning of the software or external interference to steal the data.
Either way, the cost of recovery is immense, not to talk about the time lost in the process. Hidden or not, these expenses will have a big role in fixing the final profit and loss accounts.

Adding to this is the loss of credibility of the business. The output will be negatively impacted and the company will have to do great degree of explanations to the customer. It is an equal task to recover lost data and to recover lost credibility. Consumers have other options and look elsewhere. But the company cannot afford that luxury.
While the margin for deliberate external intrusion possibilities remains large, many of these security breaches are caused by human error. One needs to realise that however deep an entity goes digital, there is always that unavoidable human touch that makes it run. AND, to err is human!
This underlines the need for proper intense training. There are studies that say employee ignorance is one of the leading contributors. Workers may know the essential basics of an application, but that does not make him or her a cyber security expert. While the IT departments execute a new cloud computing initiative or new application software, they have to ensure that those handle it on a daily basis are equipped to manage a crisis.
Types of cyber threats
Cyber threats are ever-evolving and cybercriminals use different types of malware to get what they want. Malware is an abbreviated form of “malicious software.” This is software that is specifically designed to gain access to or damage a digital device, usually without the knowledge of the owner.
Crypto jacking: Malware that gives cybercriminals access to “mine” cryptocurrency on your computer, at the expense of your resources.
Form jacking: Malware in which cybercriminals inject malicious code into online forms to steal payment card details on legitimate websites.
Ransomware: It is a malicious software that uses encryption to hold data for ransom, the purpose of which is to extort money from the victims with promises of restoring encrypted data. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking somebody into installing it.
Phishing: These are fake emails that can look surprisingly legitimate. If you get tricked into clicking a link or providing information, thieves can get your passwords and account numbers.
Zoom Bombing: Intruders hack into online meetings.
Remote Access Trojans (RAT): Malware that gives a cybercriminal a “back door” to remotely access a compromised computer.
Spyware: It is unwanted software that infiltrates your device, stealing your Internet usage data and sensitive information. Spyware gathers your personal information and relays it to advertisers, data firms, or external users.
Dark web: It is an underground online community where criminals can go to buy and sell your personal information.
Defense
All digital devices need to be protected using a highly-rated, proven anti-virus program. These programs provide a shield for your operating system in the form of a real-time scanner. When your antivirus program detects an infected file or program, it can delete it on the spot or move it to a special "quarantine" folder. When your antivirus quarantines a file, it prevents it from interacting with the rest of the computer.
A Virtual Private Network (VPN) creates a private network within a broader network, adding security by using encryption and tunneling mechanisms. There are some free VPN products available, but these may trade your information to help offset their costs, or impose other limitations, such as how much VPN data available per month. A paid subscription service may enable you to deploy a powerful, yet easy-to-use VPN that protects your Wi-Fi connections, bandwidth and privacy with guarantees against any losses. These VPN’s work with all digital devices - PCs, Macs, smartphones and tablets.
It goes without saying that users of all digital devices that use Wi-Fi connectivity must become more mindful of cybersecurity needs, and companies must invest in security programs and ongoing employee training.
- HS HYOSUNG
- 2025 Community Contribution Recognition Day
- Community Contribution Certified Company
- ESG Principles
- Corporate Social Responsibility
HS HYOSUNG ADVANCED MATERIALS Earns Seventh Community Contribution Certification
- By TT News
- November 29, 2025
HS HYOSUNG ADVANCED MATERIALS has been honoured as a Community Contribution Certified Company for the seventh consecutive year. The recognition was conferred at the 2025 Community Contribution Recognition Day event in Seoul, where the company also received a Minister of Health and Welfare’s Commendation and the highest possible ‘S’ grade. This dual accolade underscores the sustained public value and consistent performance of its social responsibility programmes.
The certification itself is a rigorous evaluation administered by the Ministry of Health and Welfare and the Korea National Council on Social Welfare. It involves a comprehensive review based on ESG Principles, spanning multiple evaluation areas and numerous detailed indicators. In the latest assessment, the company excelled particularly in environmental management, earning recognition for its robust sustainability and carbon-neutral practices. Its diverse community initiatives, which are developed through long-term regional partnerships and extensive employee volunteerism, were also highly commended for building a stable and effective collaborative framework with local communities.
This ongoing commitment has been strategically reinforced following the establishment of the HS Hyosung Group in 2024. Under the new slogan ‘Value, Together’, the company has redefined its approach to social contribution. Its efforts are now organised around three core pillars: providing support for vulnerable groups, fostering the advancement of local communities and culture and promoting eco-friendly initiatives.
H S CHO, Vice Chairman, HS HYOSUNG, said, “Receiving the Minister of Health and Welfare’s Commendation and the highest ‘S’ grade is the result of our longstanding commitment to putting ‘Value, Together’ into action within our communities. We will continue to carry out diverse social contribution initiatives as a responsible company that grows together with local communities.”
Toyo Tires Joins GDSO For Digital Advancement
- By TT News
- November 28, 2025
Toyo Tires has become a member of the Global Data Service Organisation for Tyres and Automotive Components (GDSO). This international non-profit is dedicated to creating universal data standards for tyres and auto components. Through this collaboration, Toyo Tires will intensify its efforts to establish industry-wide systems for tyre identification and traceability, which are crucial for modern supply chains.
A core component of this initiative involves the use of radio frequency identification (RFID) technology. This wireless system allows for non-contact identification of individual tyres, which significantly improves the accuracy and efficiency of quality assurance and inventory management processes. By building a comprehensive database of its products, Toyo Tires will enhance information reliability across the entire industry.
The data accumulated through RFID will be instrumental in developing high-value-added services, particularly within the company’s solution business such as retreading and maintenance programmes. This strengthens information management throughout a tyre's entire life cycle. Furthermore, this technological adoption supports Toyo Tires' broader commitment to sustainability. By proactively leveraging digital tools like RFID, the company aims to reduce its environmental impact while simultaneously enhancing its corporate value and advancing the development of more sustainable tyres.
- Hankook Tire
- FIA World Rally Championship
- Rally Saudi Arabia
- Hankook Dynapro R213
- Racing Tyres
- Motorsport
Hankook Gears Up For 2025 FIA WRC Finale, Rally Saudi Arabia
- By TT News
- November 28, 2025
Hankook Tire, the exclusive rally-tyre supplier for the FIA World Rally Championship, is all set to provide tyres for all competitors in the championship's dramatic 2025 season finale, Rally Saudi Arabia. Taking place from 25 to 29 November in the Jeddah region, this decisive event marks the WRC's inaugural visit to the country. The rally’s route, centred around the Jeddah Corniche Circuit, comprises approximately 319 kilometres of competitive action across 17 special stages, presenting a completely new challenge for teams and drivers.
This new Middle Eastern challenge demands a tyre capable of mastering a vast spectrum of conditions. The stages combine long, fast desert sections with technically demanding rocky terrain, all subject to sharp temperature swings, blowing sand and unpredictable micro-climates. Hankook will equip the crews with its Dynapro R213, an extreme all-terrain rally tyre engineered specifically for such rough and unpaved surfaces. Available in Hard and Soft compounds, it features a robust casing and a specialised tread pattern to deliver stable grip, crisp steering response and reliable impact absorption at high speeds, all while managing heat buildup for consistent long-stage performance.
The rally also serves as the setting for the championship's climax. The Drivers' Championship will be settled in Jeddah, with Toyota GAZOO Racing's Sébastien Ogier having narrowed the gap to leader Elfyn Evans to just three points after his recent victory in Japan. This sets the stage for a final, high-stakes showdown where tyre strategy and durability will be as critical as outright speed, focusing the global motorsport world on the Saudi desert.
GitiWinterW2 Joins Giti AdvanZtech EV Ready Portfolio
- By TT News
- November 28, 2025
Giti Tire has intensified its AdvanZtech EV Ready initiative with the introduction of the GitiWinterW2, a winter tyre engineered to perform on battery-electric vehicles, hybrids and traditional internal combustion engines. This new product, available for the 2025/26 winter season, is the first winter-specific offering within this specialised tyre line. The range is comprehensive, encompassing 17 different sizes to fit rims from 15 to 20 inches, making it suitable for a wide array of vehicles from the compact Fiat 500e to the Tesla Model 3 and popular SUVs like the Volkswagen Tiguan and Volvo XC60 PHEV. Each tyre is marked with a distinct sidewall logo to guide consumers towards the correct application for their vehicle type.
The development of the GitiWinterW2 focused on achieving a balance of critical performance attributes. Engineers prioritised managing the high torque output of electric vehicles for superior control while simultaneously minimising rolling resistance to help extend driving range. This technical development was accomplished without sacrificing the essential safety and handling characteristics required for winter driving in snow and wet conditions. The manufacturer emphasises that the final product delivers a quiet, comfortable and secure driving experience.
This winter tyre joins the existing summer patterns, the GitiSportS2 and GitiSynergyH2, which were originally launched in August 2024 under the same AdvanZtech EV Ready strategy. All three tyre lines are the result of research and development conducted through Giti's global AdvanZtech system, with significant work carried out at their European Research & Development Centre located in Hannover, Germany.
Fabio Pecci-Boriani, Deputy General Manager – Product Planning PCR and LTR, Giti Tire R&D Centre (Europe), said, “The Giti brand was among the first in the mid-market to introduce an EV ready concept, ensuring maximum flexibility and product clarity for dealers and peace of mind for drivers. As is proven, winter can have an impact on the performance of part-electric and electric vehicles with lower temperatures reducing battery range and immediate torque levels being tricky on slippery roads; the Giti AdvanZtech EV ready GitiWinterW2 goes a long way to addressing these issues.”

Comments (0)
ADD COMMENT