Home Tags Panasonic

Tag: Panasonic

Grass Valley presents EDIUS 8.5 at the NAB Show

Grünwald, 25th of April 2017 — Today Grass Valley presents version 8.5 of EDIUS at the NAB Show in Las Vegas.These are the most important new features included in the update to version 8.5:Support of H.265 HEVC Codec: EDIUS now supports the importing as well as the editing of H.265 material as used by e.g. the Samsung NX1, the latest DJI drones or the Panasonic GH5 camera when using its 6K photo mode.Metadata: EDIUS 8.5... Source: RealWire

Panasonic’s new rugged 2-in-1 detachables reflect European market demand for hybrid...

Hybrid mobile devices to reach a European tipping point in 2017, reports IDC EuropeBracknell, UK. 22nd MARCH 2017 Panasonic’s latest rugged 2-in-1 detachables reflect European business demand for hybrid mobile devices with display sizes of 12-13.3 inches, according to the latest findings from analyst group IDC Europe.

The recently introduced fully rugged Panasonic Toughbook CF-33 with a 12 inch display and the semi rugged Panasonic Toughpad FZ-Q2 with a 12.5 inch display are both 2-in-1... Source: RealWire

Panasonic introduces a new 2-in-1 semi-rugged device for business, the Toughpad...

The flexible design, large 12.5” display and wide range of business ports makes the device ideal for mobile workersBRACKNELL, UK. 6TH MARCH 2017 - Panasonic today launched its first semi-rugged 2-in-1 detachable notebook designed to offer mobile workers the very best of both worlds with tablet and notebook functionality in a light but durable business device.

The 2-in-1 Panasonic Toughpad FZ-Q2 notebook has a large 12.5” display for easy viewing and a wide range of... Source: RealWire

Panasonic Introduces the Toughbook CF-33 12 inch 2-in-1 Fully Rugged Laptop

Providing a decade of backward compatibility, 2-in-1 laptop offers 3:2 aspect ratio for enhanced efficiency in public sector, federal and enterprise applicationsBracknell, UK. 27TH FEBRUARY 2017 Panasonic today announced the world’s first 3:2 aspect ratio, fully rugged 2-in-1 detachable laptop[1] as its latest addition to the Toughbook family of products.

The device is Panasonic’s 7th generation rugged Toughbook laptop and is the culmination of 20 years of innovation in rugged PC design and manufacturing.This larger... Source: RealWire

New Panasonic Whitepaper addresses the Business Tablet Docking Divide

Just 19% of business tablets are vehicle mounted, European research showsBracknell, UK. 7th February 2017 A new Panasonic whitepaper published today addresses the business tablet docking divide.

European research from leading technology analyst group IDC reports that just 19% of business tablets are vehicle-mounted and only 23% of companies have even considered vehicle-mounting their tablets.

The Panasonic whitepaper “To Dock or Not to Dock; that is the question?” examines the business benefits of vehicle-mounted tablets... Source: RealWire

Mozilla gives up on Firefox OS, lays off 50

Browsers remain the only area in which the nonprofit has had much market success.

28% off Panasonic ErgoFit In-Ear Comfort Fit Noise Isolating Earbuds –...

If you believe the reviewers on Amazon, you may not find a better sounding pair of earbuds at this price point, which at the current 28% discount is just $10.86.

The ErgoFit earbuds from Panasonic are designed to fit comfortably and securely in your ear, isolating outside noise while delivering great sound with a wider frequency range than most comparable buds.

The earbuds come in various colors and features a generous 3.6 ft. cord that easily fits through or around your clothes, coats and bags.

The ErgoFit earbuds average 4.5 stars from over 39,000 people on Amazon (read reviews) which lends some credibility to Panasonic's claim that the earbuds deliver dynamic, crystal clear sound while successfully blocking ambient noise.
Its typical list price of $15 has been reduced 28% to just $10.86.To read this article in full or to leave a comment, please click here

Gogo Aims to Improve Airline WiFi Security with Bug Bounty Program

Security researchers can now look for security flaws in Gogo's in-flight internet and entertainment system, with the promise of getting paid up to $1,500 per vulnerability. There is now an authorized way for security researchers to help improve in-flight security for connected internet and entertainment systems, operated by Gogo.

The Gogo bug bounty program, operated by Bugcrowd, rewards security researchers between $100 and $1,500 per bug that is properly disclosed."Gogo has a robust security program already in place and they were ready to add a public bounty program as an additional line of cybersecurity defense," Casey Ellis, CEO and founder, Bugcrowd told eWEEK.The goal of the Gogo bug bounty program is to help make sure that Gogo's platform is secure and not at risk from vulnerabilities.

The scope of the program includes both Gogo's ground-based public website as well as in-flight system.

Ellis noted that researchers can test the live Gogo inflight system while on Gogo-enabled flights."The gogoinflight.com domain and sub-domains act as an internet gateway proxy and also serve video content to customers on the plane," Ellis said. The bug bounty program has some limits in place and is restricted to the gogoair.com and gogoinflight.com domains.

Ellis commented that any domain or property of Gogo that is not listed in the targets section of the Gogo bug bounty program would be considered out of scope. "However, if a researcher believes they've found a security issue, we always encourage them to submit it and state their case, as the ultimate goal is improved security," Ellis said. "While submissions out of scope may not be eligible for a reward, we always escalate issues of high priority to the client for evaluation - regardless of scope."Another type of attack that is in fact 'out of scope' for the Gogo program is Distributed Denial of Service (DDoS).

Ellis explained that DDoS is generally treated as a 'known issue' since everyone is vulnerable to DDoS because of the way the internet works. He added that DDoS is not usually caused by any unique vulnerability or weakness."As such, demonstrating a DDoS vulnerability provides no value to the vendor and, of course, is disruptive to the business," Ellis said. "This is why it's typically excluded."Hacking in-flight internet and connected entertainment systems hasn't always been met with encouragement. On December 20, security firm IOactive publicly reported that it found multiple security flaws in Panasonic's Avionic In-Flight Entertainment (IFE) system that could potentially give an attacker unauthorized access. Panasonic has disputed the allegations stating that the IOactive research was mis-leading.In 2015, security researcher Chris Roberts also made claims about being was able to hack into an aircraft's in-flight systems, which led to an FBI investigation.Ellis noted that the Gogo program is different than past in-flight security research in several areas, most notably the fact that Gogo is using a managed bug bounty program.

Ellis said that Roberts didn't have permission to test the systems in the first place, and was therefore in violation of the Computer Fraud and Abuse Act (CFAA) and other laws.

Additionally, Ellis noted that Roberts sent Twitter messages that referred to his ability to access flight control systems, not just the entertainment systems themselves, which puts that hack in a completely different category."Permission and exemption from legal pursuit is granted as a function of the disclosure program itself," Ellis said about the Gogo bug bounty program. "The context is limited to the entertainment and internet systems only, so it's clear to researchers that systems other than these are off-limits."The Gogo bug bounty program officially opened up to researcher submissions on December 22 and currently has 413 participants.

To date, Gogo has already issued six awards to researchers for finding and reporting flaws as part of the bug bounty program.

As part of the program, Gogo prohibits researchers from publicly disclosing vulnerabilities that are discovered.

From a reward perspective, Ellis said that Gogo decided to issue rewards in line with Bugcrowd’s Vulnerability Rating Taxonomy, which is an effort to normalize vulnerability prioritization and pricing, and create clear expectations between the hackers and the program owners.Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com.

Follow him on Twitter @TechJournalist

Security Vulnerabilities Discovered in Airline In-Flight Entertainment Systems

Security firm IOactive finds multiple security flaws in Panasonic's Avionic In-Flight Entertainment (IFE) system that could potentially give an attacker unauthorized access. Panasonic disagrees. Security firm IOactive on December 20 publicly announced that it has found multiple security flaws in Panasonic Avionic In-Flight Entertainment (IFE) systems used on multiple airlines around the world.

The flaws were first reported to Panasonic by IOactive in March 2015 and were not publicly discussed until today, in an effort to give Panasonic and airlines time to fix the issues.According to IOactive, Panasonic said that it would notify its airline customers of the issues, as such IOactive did not disclose the vulnerabilities to any airlines directly.
IOactive also alerted Aviation Information Sharing and Analysis Center (A-ISAC) members last week ahead of public announcement, so those potentially impacted could prepare for the news going public.The vulnerabilities discovered by IOactive could have potentially enabled an attacker to take over in-flight displays used by passengers, turn the lighting system on or off as well as steal credit card information that may be stored in the system.

There is also the potential risk that that vulnerabilities found by IOactive could be chained together and enable an attacker to get wider access to an aircraft's in-flight systems.Hacking into IFE systems is not something that airlines take likely.
In 2015, security researcher Chris Roberts claimed that he was able to hack into an aircraft's flight control through an IFE system, which led to an FBI investigation. Unlike Roberts, who tweeted his claims while on an aircraft, IOactive's security researcher took a different approach. "The bugs were not exploited, they were only identified with simple and inoffensive tests," Ruben Santamarta, Principal Security Consultant at IOActive, told eWEEK. In terms of the actual technology components, an IFE system includes both Seat Display Units which is what passengers interact with, and the System Control Unit, which is what airline staff use to control the IFE system.
Santamarta explained that the Seat Display Units are basically embedded devices, running their own operating system, usually Linux or Android."The vulnerabilities are located on both server and client components," he said.Looking at the actual vulnerabilities, Santamarta explained that some of the vulnerabilities he discovered are data input sanitization issues.

Data input sanitization refers to a program's ability to only accept proper inputs. Without proper data input sanitization, SQL injection and other forms of security techniques can potentially be used to exploits a system. Other issues that Santamarta found include a lack of authenticated encryption during network operations and the use hardcoded credentials.Getting access to the IFE system to exploit the vulnerabilities is not a trivial task either.

Aircraft passengers typically only have access to the IFE system via Wi-Fi, which is not necessarily a method by which the IOactive vulnerabilities can be exploited."We can't discard the Wi-Fi scenario but due to the limitations of our analysis, which was mainly based on static analysis approaches, the attacker would need physical access," Santamarta said.An additional barrier for any potential IFE system hacker is the fact that airlines implement a very segmented approach to on-board systems.

As such the IFE system is supposed to be separate from other on-board systems.
Simply isolating each individual Wi-Fi client and Seat Display Unit however isn't enough to thoroughly guarantee security."A more complex approach needs to be implemented to mitigate the risks," Santamarta said. "Eventually, it would be simpler to fix the code."For its part, Panasonic disagrees with IOactive's assessment.
In a statement emailed to eWEEK, Panasonic stated that, the allegations made to the press by IOActive regarding in-flight entertainment (IFE) systems manufactured by Panasonic Avionics Corporation (“Panasonic”) contain a number of inaccurate and misleading statements about Panasonic’s systems. "IOActive has chosen to make highly misleading and inflammatory statements suggesting that hackers could 'theoretically' gain access to flight controls by hacking into Panasonic’s IFE systems," Panasonic stated. "Panasonic strenuously disagrees with any suggestion by IOActive that such an attack is possible, and calls upon IOActive to clarify that its research does not support any such inference."Panasonic also stated that the conclusions suggested by IOActive to the press are not based on any actual findings or facts. "The implied potential impacts should be interpreted as theoretical at best, sensationalizing at worst, and absolutely not justified by any hypothetical vulnerability findings discovered by IOActive," Panasonic stated.Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com.

Follow him on Twitter @TechJournalist

This is your captain speaking… or is it?

In-flight entertainment systems create hacker risk, say researchers Vulnerabilities in Panasonic in-flight entertainment systems create a possible mechanism for attackers to control in-flight displays, PA systems and lighting, say researchers. Ruben Santamarta, principal security consultant at IOActive, said it had found vulnerabilities in Panasonic Avionic In-Flight Entertainment (IFE) systems that it claims could allow hackers to "hijack" passengers’ in-flight displays and, in some instances, potentially access their credit card information.

The research revealed it would also theoretically be possible that such a vulnerability could present an entry point to the wider network, including the aircraft controls domain. “I’ve been afraid of flying for as long as I can remember,” said Santamarta. “It might sound like a sick cure to some but, as a hacker, learning everything I could about how planes work, from the aerodynamics to electronics, has reduced the fear significantly. On a 2014 flight from Warsaw to Dubai, I discovered I could access debug codes directly from a Panasonic inflight display.

A subsequent internet search allowed me to discover hundreds of publicly available firmware updates for multiple major airlines, which was quite alarming. Upon analysing backend source code for these airlines and reverse engineering the main binary, I’ve found several interesting functionalities and exploits.” IFE system vulnerabilities identified by Santamarta might most straightforwardly be exploited to gain control of what passengers see and hear from their in-flight screen, he claimed.

For example, an attacker might spoof flight information values such as altitude or speed, or show a bogus route on the interactive map.

An attacker might also compromise the "CrewApp" unit, which controls PA systems, lighting, or even the recliners on first class seating.
If all of these attacks are applied at the same time, a malicious actor may create a baffling and disconcerting situation for passengers.

Furthermore, the capture of personal information, including credit card details, is also technically possible due to backend systems that sometimes provide access to specific airlines’ frequent-flyer/VIP membership data, said the researcher. Aircraft's data networks are divided into four domains, depending on the kind of data they process: passenger entertainment, passenger-owned devices, airline information services, and finally aircraft control.

Avionics is usually located in the Aircraft Control domain, which should be physically isolated from the passenger domains; however, this doesn’t always happen.

This means that as long as there is a physical path that connects both domains, there is potential for attack.

The specific devices, software and configuration deployed on the target aircraft would dictate whether an attack is possible or not.
Santamarta urged airlines to steer towards a cautious course. “I don’t believe these systems can resist solid attacks from skilled malicious actors,” he said. “As such, airlines must be incredibly vigilant when it comes to their IFE systems, ensuring that these and other systems are properly segregated and each aircraft's security posture is carefully analysed case by case.” IOActive reported these findings to Panasonic Avionics in March 2015.
It only went public this week after giving the firm “enough time to produce and deploy patches, at least for the most prominent vulnerabilities”. Panasonic Avionic’s technology is used by a several major airlines including Virgin, American and Emirates airlines. El Reg asked Panasonic Avionic to comment on IOActive's research but we’ve yet to hear back. We’ll update this story as and when we learn more. The avionics research has some parallels with IOActive’s remote hack of the Jeep Cherokee in 2014, in which hackers took control of the vehicle’s dashboard functions, including steering, brakes, and transmission, through vulnerabilities existing in the automobile’s entertainment system. Once again, it appears entertainment systems have created a potential route into sensitive systems that hackers might be able to exploit. Stephen Gates, chief research intelligence analyst at NSFOCUS, commented: “In the light of this research, physical separation between in-flight entertainment systems and aircraft control systems could never be more important.

As airlines continue to add new customer-based entertainment and information technologies, airlines need to ensure that an impenetrable barrier is in place protecting aircraft control systems. “This research demonstrates that hackers could cause all sorts of issues that could impact a customer’s 'experience' while flying, but have yet to prove they could impact flight control systems,” he added. ® Sponsored: Flash enters the mainstream.
Visit The Register's storage hub

Origin of the beasties: Mirai botnet missing link revealed as DVR...

CCTV cameras? You've been looking in the wrong place Security researchers have discovered a "missing link" in the Mirai botnet that may prompt a rethink in what makes up the zombie network. The release of Mirai's source code in early October revealed that malware scans for telnet before attempting to hack into devices, using a brute-force attack featuring 61 different user/password combinations. Security researchers including Brian Krebs have been able to match this list, with a few exceptions, against the default credentials of various IoT devices. One view, espoused by DDoS mitigation outfit Imperva Incapsula, was that CCTV cameras made up the bulk of the zombie horde with DVRs and routers playing a supporting role. New research casts further doubt on this diagnosis, already questioned by US telco Level 3, which estimated four in five Mirai bots are DVRs with the rest being routers and other miscellaneous devices, such as IP cameras and Linux servers. UK-based security consultancy Pen Test Partners (PTP) discovered that a DVR device they recently bought was vulnerable to a previously unassigned credential pair on the Mirai hit list. "That means that the Mirai authors knew about the default credentials for this DVR, but no one else seemed to," PTP reasons. Some of the attributed devices were CCTV cameras, which generally offer less functionality than DVR devices and therefore might make them a less flexible attack platform. Looking deeper, PTP uncovered evidence that the conventional wisdom that Mirai is mostly CCTV cameras might be wrong. "On further digging, we found that all the cameras we looked at were running near-identical code to the DVRs and ran the 'dvrHelper' process, as did the DVRs we looked at," a blog post by PTP explains. "The reason the cameras were vulnerable is that they were running an uncustomised version of the DVR software, rather than being targeted specifically because they were cameras." A similar rationale has led PTP to posit that neither RealTek routers nor Panasonic printers are being exploited by Mirai. "Whilst the default creds are the same, it's a coincidence," according to PTP. "We think it's more likely that the RealTek devices in question are from their DVR range, particularly as they are often rebadged and rebranded. "Mirai is more to do with DVRs than CCTV cameras.
Some have claimed that they've seen Mirai traffic from devices that weren't DVRs or cameras. We've been running a Mirai honeypot for some time. Whilst we've seen scans from routers and other devices attempting these same default credentials, none of them have then tried to exploit our honeypot in the same way as Mirai. "We think it's more likely that there is code out there that is similar to Mirai doing this, but it's not Mirai." ® Sponsored: Customer Identity and Access Management

Pain but no gain for workers suffering with poorly designed barcode...

52% of workforce suffering from RSI.

Time off work costing employers an annual average of £338 per person
BRACKNELL, UK. 13TH October 2016 - Logistics and delivery workers say the pressures of work and poorly designed mobile barcode scanners are affecting their health and productivity, according to latest research. 63% reported they suffered from wrist or arm aches and pains with 69% forced to take time off for an average of two and three quarter sick days in the past year – costing their employer £310 per person*. Repetitive Strain Injury (RSI) also affected 52% of the workforce with 78% of those affected having to take an average of three sick days in the past 12 months – costing the employer £338 per person*. The Scanning Pain For No Gain report, undertaken by independent market research company Opinion Matters and commissioned by Panasonic Business, reported that 60% of workers from the delivery, warehouse and logistics industry felt their mobile barcode scanner device was only fairly effective or not effective at all. Their biggest stress factors were the slow and cumbersome scanning process due to the device being used (32%), the time it took to scan packages (31%), hard to scan items (26%), delivery times being reduced (23%) and the number of packages to be scanned in a day (22%). To compound the problem, workforces believed that scanning requirements were dramatically rising with the average worker saying they scanned 197 times a day with year-on-year growth estimated at 24%. Device issuesPoor battery life (46%), screen visibility (27%), poor signature sensitivity (19%), difficult to scan (14%) and failed scan attempts (14%) were the top device design complaints from the workforce.

Failed electronic signature capture was also reported as a productivity drag, with workers seeing an electronic signature capture failure once every two days. The top three suggestions to improve barcode scanning and signature capture were a high precision pen (49%), a device with an angled barcode scanner (36%) and better screen visibility in bright sunlight (22%). Major health and productivity improvements from design changesWorkers unhappy with their mobile devices said that significant productivity improvements could be made with their recommended design changes. On average, workers said scanner activation buttons on both sides of the device could increase scanning numbers by 13%.

An angled barcode scanner and high precision pen would improve scanning productivity by 12%. “UK workers using a mobile barcode scanning device are clearly suffering by using poorly designed, older generation equipment and it is damaging not only business productivity but also their health,” said Jan Kaempfer, General Manager for Marketing for Panasonic Computer Product Solutions. “With consumer demands for same day delivery and the number of scans a day rising with double digit percentage growth, technology must also continue to innovate if worker health and productivity are not to suffer further.

An angled barcode scanner, easy screen visibility, a high precision pen and activation buttons on either side of the device are all clearly design benefits that would have a major impact on business productivity and the health of the individuals using the devices.

From our own tests and the testimony of an RSI specialist, we have seen that the angled barcode in our latest Panasonic device and having the screen in constant view throughout the scanning process, removes the need to tilt the device – helping to keep the arm and wrist in a stable position and reducing the chances of RSI or arm pain.” The study was undertaken in April 2016 and the research sampled 500 UK mobile scanning workers.

To download a full copy of the report, please click here http://computers.panasonic.eu/mobile-scanning-and-productivity For further information visit: www.toughbook.eu *Sickness costs based on XpertHR’s survey on the cost of British worker sickness 2014, based on data provided by 670 organisations, covering just under two million employees. Press contact:Michael BartleyThe Amber Groupmichael@ambergroup.net+44 (0)118 949 7750 About Panasonic System Communications Company Europe (PSCEU)PSCEU is the European branch of Panasonic Systems Communications Company, the global B2B division of Panasonic. PSCEU’s goal is to improve the working lives of business professionals and help their organisations’ efficiency and performance. We help organisations capture, compute and communicate all sorts of information: image, voice, and textual data. Products include PBX telephone switches, document printers, professional cameras, projectors, large visual displays, rugged mobile PCs and fire alarms solutions. With around 400 staff, engineering design expertise, global project management capability and a large European partner network, PSCEU offers unrivalled capability in its markets. PSCEU is made up of four product categories: Communication Solutions, including professional scanners, multifunctional printers, telephony systems and SIP terminal devices. Visual System Solutions, including projectors and professional displays. Panasonic offers the widest range of Visual products, and leads the European projector market with 28% revenue share. (Futuresource B2B market tracking, Q1/2014) Professional Camera Solutions, including Broadcast & ProAV products, security, fire alarm systems and industrial medical vision (IMV) technology. Panasonic is one of the top two professional camera vendors in Europe. Computer Product Solutions helps mobile workers improve productivity with its range of Toughbook rugged notebooks, Toughpad business tablets and electronic point of sales (EPOS) systems.

As European market leaders, Panasonic Toughbook had a 66% revenue share of sales of rugged and durable notebooks and Panasonic Toughpad held a 59% revenue share of sales of rugged business tablets in 2015 (VDC Research, March 2016). Disclaimer: All brand names shown are the registered trademarks of the relevant companies.

All rights reserved.
All working conditions, times and figures quoted are optimum or ideal levels and may differ as a result of individual and local circumstances. Specifications, product availability and price given herein may be changed at any time without prior notice.