The HUBER+SUHNER booth will focus on its solutions for Connected Mobility – merging both communications and rail through instrumental components, thus enabling broadband network connections on the train, train-to-ground and on the trackside.
As such, it will be showcasing a wide range of products allowing passengers, rail... Source: RealWire
Fast Track data centre service delivers new data centre in just eight weeks
London UK, 12 January 2017 – Secure I.T.
Environments Ltd, one of the UK’s leading designers and builders of modular data centres, has today announced the completion of a new internal data centre for The Energy Systems Catapult, at its new head office in Birmingham, UK.
The new data centre, which is housed on the seventh floor of a central Birmingham office, was built on-time in just eight weeks. Key construction challenges included ensuring power supply cabling was adequate and could reach distribution boards, the close control air conditioning system condensers required extended pipework to enable the units to be housed on the roof.
The data centre has been built with raised flooring, cold aisle containment air conditioning, with great attention placed on ensuring space was utilised as efficiently as possible given restrictions of the physical building.
Environments was responsible for the design and delivery of the data centre which included power supply infrastructure, environmental controls, server racks, and UPS.
The Energy Systems Catapult’s vision is for a clean, intelligent energy system that works for people, communities and businesses.
They aim to take a whole systems approach to the challenge of transforming the UK’s energy sector, both affordably and securely, and is also helping the UK capture commercial opportunities and create new businesses across the energy sector.
With an emphasis on energy systems and efficiency central to the mission of the Energy Systems Catapult, delivering a data centre that reflected these qualities was essential.
Environments has used its skills in this area to ensure the data centre delivers a PUE of 1.17.
Chris Wellfair, projects director at Secure I.T.
Environments said, “Delivering a data centre quickly requires a great deal of skill, so as not to compromise success. We have built up a wealth of skills and a proprietary methodology in this area, which means we can deliver challenging projects at speed without compromising on attention to detail, energy efficiency, security or design quality.
This proven track record is one of the reasons that we were selected through the tender process to deliver this project for the Energy Systems Catapult.”
About Secure I.T.
Environments Ltd is a UK company specialising in the design and build of energy efficient internal/external secure modular data centres and infrastructure.
Secure IT Environments Ltd has established an enviable relationship with its clients based on trust, mutual respect, working as a team with the client and proven performance.
The company offers a “Total Solutions Package” to the private, healthcare, education and government sectors, as well as co-hosting companies in the UK and offshore, by way of design, implementation and installation management services for projects from small stand-alone computer rooms to large public sector contracts and co-hosting locations.
All rooms are designed to meet the latest BS476/EN1047 standards, now regarded as the benchmark standard for new data centres being installed throughout the UK and Europe.
Environments’ primary aim is to ensure that clients’ critical hardware is protected against all external threats in a Green Data centre.
To this end the company has established long-standing partnerships with its manufacturers, who are at the forefront of R&D, to ensure the highest level of physical protection and energy efficiency is maintained.
For press enquiries, please contact:
07912 495 630
These types of calls were the most reported scams of 2016, says Hiya, closely followed by PPI calls, and calls claiming you’ve won a prize. The car accident scam peaked in October - the worst month of the year for mobile phone scams overall – with growth of 84% in the period January to November. PPI scam claims peaked in November and saw an 81% growth over the year.
The UK leads Europe in that it has the highest percentage of nuisance calls, at a significant 13% of all calls placed. “Defrauding people is big business, which is why the number of scam calls continues to grow and more elaborate schemes appear,” says Alex Algard, CEO of Hiya. “Scammers are getting more sophisticated.
They mask the calls by using common area codes so people answer them. Our advice is to be careful and trust your instinct.
If an offer sounds too good to be true, then it probably is.” The year in review: Newcomer scam of the year: ‘Lucky Winner’ Worst month for phone scams: October Scam that declined over the year: Betting, down 240% from Jan-Nov, peaked in March Worst area code offenders: (020) London (0161) Manchester (0141) Glasgow (0113) Leeds (0121) Birmingham (01922) Walsall (01268) Basildon (0151) Liverpool (0115) Nottingham (01792) Swansea Top Scams in the UK: Car accident claims, 84% growth over the year, peaked in October PPI scam calls, 81% growth over the year, peaked in November Lucky winner, 64% growth over the year, peaked in October Loan scams, 85% growth over the year, peaked in August All inclusive holiday compensation, 91% growth over the year, peaked in October About HiyaHiya provides enhanced caller ID products and services designed to make the phone experience better. With a database of more over 1.5 billion unique numbers globally, Hiya leverages its expansive algorithms to identify unknown calls and texts and to monitor phone-based threats for consumers and businesses. Hiya screens more than 665 million incoming calls per month, and has detected more than one billion robo, telemarketing and scam calls and texts to date. Hiya is available as a consumer app on Google Android and iPhone and is integrated into the phone experience for T-Mobile and Samsung Galaxy S7 users worldwide.
For more information, please visit www.hiya.com. For more information on the survey, contact:Kate Hartley / Malini MajithiaCarrot Communications0203 770 5836 / firstname.lastname@example.org
Timing absolutely was everything for us." Papworth has since moved to hourly incremental backups, using mixed media including tape, given that some attacks target digital backups. Berezynskyj, speaking at the EHI Live healthcare conference in Birmingham this week, said Papworth was hit by a new variant of crypto software for which there was no remedial software. "We've got some fairly ancient application architecture so we've got some file-shares, and actually that's what happened to us – a crypto attack went through our file-shares and encrypted the data." "Thank God for that full backup, then," she added. "We're pretty certain that when we suffered our ransomware attack, the user concerned navigated away from that screen that said: 'This is a ransomware attack, please pay X amount in bitcoins'," Berezynskyj said, but the person never reported what happened. "One of our key weaknesses is our people and user behaviour," she added, despite a programme of staff education and communication. The trust's four-person IT team worked from 1am to 9pm on the Sunday, with further work with suppliers on Monday and Tuesday, to recover its systems. Papworth had not budgeted for such an attack, although Berezynskyj said she had been able to absorb its cost within existing budgets.
It did not hit clinical care, but this again was down to timing. "We don't do Sunday operations, so it didn’t affect operating theatres," she said. "If we'd been doing a heart operation on a Sunday, it would have been a huge problem." Berezynskyj added that she is trying to persuade the trust's financial director to include provision for attack recovery. "It's not if, it's when it's going to happen," she said. "But that dialogue is still evolving, because finance people only like to plan for what's actually going to happen, and I can’t give cast-iron guarantees." She mentioned research suggesting that each cyber-attack in healthcare costs £80,672-£161,345 (€90,000-€180,000). Papworth is famous as the centre for the UK's first successful heart transplant in 1979. Speaking at the same session, Lydia Kostopoulos, a principal consultant for PA Consulting, said an experiment she ran sending benign phishing emails to staff at US hospitals found they were most likely to be clicked on between 11pm and 5am, particularly by nurses on graveyard shifts. Northern Lincolnshire and Goole NHS foundation trust is currently recovering from a major incident following a cyber-attack which led it to cancel operations. ® Sponsored: Customer Identity and Access Management
The city suffered 670 percent more ransomware attacks than Manchester, the nearest other hotspot for such cyber-attacks.While spelling mistakes, typos and other oddities in emails can help savvy people detect dodgy emails hiding ransomware, the attacks are getting more sophisticated with botnets designed to propagate them at such a volume that someone is likely to get trapped by ransomware at some point."When analyzing the data it gave us an interesting snapshot into a growing problem facing companies.
These nefarious threats, which essentially demand money with menaces, are becoming a real problem for big business—encrypting company files for ever unless the ransom is paid. It is a modern day protection racket," added Samadi.With universities getting plagued by ransomware attacks and nearly half of all cloud malware claimed to be ransomware, it would seem like the problem is only going to get worse before it gets better.
The man, Daniel Eugene Traeger, faces a maximum five years in prison next month. He admitted Thursday that he sold customer data—from 2009 to 2014—to a private investigator whom the authorities have not named. According to the man's signed plea deal (PDF): At some point in 2009, the Defendant met a private investigator ("the PI") who wanted to buy Verizon customer information from the Defendant.
The Defendant accepted the PI's offer.
The defendant used Verizon computer systems and facilities to access customer call records and customer location data that he knew he was not authorized to access, and provided that information to the PI even though the Defendant knew that he was not authorized to provide it to a third party. The Defendant accessed customer call records by logging into Verizon's MARS system.
The Defendant then compiled the data in spreadsheets, which the Defendant provided to the PI, including by e-mail.
The Defendant accessed customer location data using a Verizon system called Real Time Tool. Using RTT, the Defendant "pinged" cellular telephones on Verizon's network and provided location data for those telephones to the PI. The plea agreement said that Traeger began making $50 monthly in 2009, when he sold two records a month.
By mid-2013, he was earning $750 each month by selling 10 to 15 records.
In all, the plea deal says he made more than $10,000 over a five-year period. The defendant was based in the Birmingham area.
The government did not say where the victims lived. Traeger is expected to appear in federal court October 20 and enter his plea.
The defendant's attorney, Michael Rasmussen in Birmingham, did not immediately respond for comment.
But those aren't the only vehicles at risk. New research presented at the USENIX security conference this week revealed that there is a critical weakness in vehicles that could enable an attacker to unlock and start a car remotely.
The research was conducted by computer science researchers at the University of Birmingham in the UK."We show that the security of the keyless entry systems of most VW Group vehicles manufactured between 1995 and today relies on a few, global master keys," the research abstract states. "We show that by recovering the cryptographic algorithms and keys from electronic control units, an adversary is able to clone a VW Group remote control and gain unauthorized access to a vehicle by eavesdropping a single signal sent by the original remote."Not only does the paper provide insight into the flaws in Volkswagens, but it also details similar flaws in the Hitag2 mechanism used in Alfa Romeo, Chevrolet, Peugeot, Lancia, Opel, Renault and Ford vehicles that enable a rolling code approach for keyless entry."Our findings affect millions of vehicles worldwide and could explain unsolved insurance cases of theft from allegedly locked vehicles," the paper states. While the impact of vehicle theft is likely in the tens of thousands of dollars per stolen vehicle, the researchers' approach makes use of a $40 device they built using the open-source Arduino micro-controller. The researchers contacted Volkswagen Group in November 2015 and met with the company in February to discuss the findings.
According to the researchers, VW Group acknowledged the vulnerabilities."As mentioned in the paper, we agreed to leave out amongst others the following details: cryptographic keys, part numbers of vulnerable ECUs [electronic control units], and the used programming devices and details about the reverse-engineering process," the researchers stated.Vehicle security experts contacted by eWEEK were not surprised by the new disclosure of widespread issues in VW Group vehicles.
David Barzilai, co-founder of Karamba Security, noted that his company has been seeing similar security issues with multiple brands. Karamba launched its flagship Carwall security platform in June in an effort to help secure vehicles' ECUs."The innovation of the USENIX paper is that it shows that a single brand and its subsidiaries are exposed, with all cars that were sold since 1995, as they all use the same master key," Barzilai told eWEEK.Corey Thuen, senior consultant at IOActive, said the keyless entry risk is in line with IOactive's expectations."We see these types of vulnerabilities being systemic to the auto industry, and this area of vulnerability is the most likely to be exploited by attackers," Thuen told eWEEK. "Unless we're talking about nation states or similar groups, your average hacker is motivated by money, so any vulnerabilities that can be turned into dollars, like this keyless entry attack, are going to be a higher likelihood."In Thuen's view, the real trouble in the auto industry, and in particular with the keyless entry risk, is all about vendor failure to follow security industry best practices.
In this case, Thuen said that proper key infrastructure and management were lacking, with the vendor instead making use of hardcoded information. He added that in IOactive's recently released Commonalities in Vehicle Vulnerabilities report, the issue is documented in detail.Barzilai believes the Karamba Carwall platform could in fact be used to limit the risk of such keyless attacks. He noted that the reported hack on VW was done through reverse-engineering an ECU and obtaining a private key."With Karamba installed, hacking into the ECU and then reverse-engineering it would be detected and prevented as a deviation from factory settings," he said. "Therefore, the attack would have probably been prevented."Barzilai added, "The attack shows that security should be done from a system approach, and the ECU is the attack surface or attack gateway to the car."Security is a very difficult thing to "bolt-on" after the fact, according to Thuen.
A failure to follow security best practices during the design and implementation phases can be very difficult, and often impossible, to remediate afterward."Microsoft, Google, Apple, OWASP and now auto-specific organizations like the Auto-ISAC have learned a lot over the past couple decades, and the auto industry needs to take advantage of that," Thuen said.Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com.
Follow him on Twitter @TechJournalist.