Wednesday, October 15, 2025
Home Blog Page 86

Ransomware- It Looks Like This

0

Cybercrime has seen a steady rise in recent years. Criminals have been using all means available to them to conduct cyberattacks and extort money out of business owners. One tool available for cybercriminals is a malware called ransomware.

According to Cybersecurity Ventures’ study from 2019, companies were affected by ransomware every 14 seconds. And this year alone, criminals stand to gain $11.5 billion due to these attacks.

What is this vicious malware, and how it came to be?

What is ransomware?

Ransom malware, or ransomware, is a type of malware that prevents users from accessing their system or personal files. As the name suggests, cybercriminals then demand a ransom payment to restore access to the data. When payment is made, users are shown instructions for getting and using the decryption key.

Ransomware is difficult to track and fight against because it can access the computer in a number of ways. One of the most common ways to infect a person’s computer is phishing spam. Criminals send attachments that come to the victim in an email, masquerading as a file they should trust. Once the file is downloaded and opened, the malware takes over the victim’s computer. Last year, up to 91% of the cases were done via spear-phishing emails.

Other methods are more aggressive, like exploiting security holes to infect computers without needing to trick users.

How it all started – the most famous cases

While cybercrime is a relatively new phenomenon, the first ransomware to go down in history was AIDS Trojan. It was programmed by American biologist Joseph Popp in 1989 using QuickBasic 3 and was distributed via floppy disks. The disks were titled AIDS Information – Introductory Diskettes and accompanied by an information booklet stating the need to purchase the license to fully use the software. Once the floppy was inserted and clicked on, the malware took over MS-DOS Windows system boot file, and printers would print a document asking for ransom. Once the payment was made, victims would get instruction on data recovery.

Joseph Popp was arrested a year later, and his imprisonment stopped him from sending an additional 2 million floppy disks containing this virus. The consequences of this attack were huge, and AIDS care research centers around the world lost nearly 10 years of study results.

CryptoLocker

One of the first large-scale ransomware attacks in the modern era was the CryptoLocker in 2013. Spread through email attachments and spam messages using the Gameover ZeuS botnet, it used 2048-bit RSA public key to encrypt user files in exchange for money. According to Avast, CryptoLocker infected over 500,000 computers at its peak. The malicious software was defeated thanks to Operation Tovar, a joint campaign between FBI, Interpol, security companies, and universities.

TelsaCrypt

TeslaCrypt was presented as a variant of CryptoLocker, but later on, gained its own identity thanks to its particular modus operandi. The ransomware targeted ancillary files associated with video games, such as saved games, maps, downloadable content, and similar. For certain people, these are the most important files that are used frequently. They are often saved locally, rather than on cloud or in external drives. In 2016, 48% of attacks were performed by TeslaCrypt, and victims were asked $500 in bitcoins.

In an unexpected turn of events, however, hackers released the main decoding key to the world for free.

WannaCry

In 2017, more than 150 countries were hit by the WannaCry ransomware attack. Designed specifically to exploit a vulnerability in Windows, it affected over 230,000 computers globally. After two years, security experts estimated that over two million computers were affected. The attack hit a third of hospital trusts in the UK, costing the National Health Service an estimated £92 million.

Affected users were locked out and unable to access their files until a ransom was paid in the form of bitcoin. The payment was set to $300, and after three days, it would double to $600. If payment was not concluded within a week, all files would be deleted. The global financial impact of WannaCry caused an estimated $4 billion in financial losses worldwide.

Bad Rabbit

Bad Rabbit first appeared in 2017 and was unique due to its spreading technique. It used a method called drive-by attack, where insecure websites are targeted and used to carry out an attack. During a drive-by ransomware attack, a user visits a legitimate website, not knowing that it has been compromised by a hacker. Drive-by attacks often require no action from the victim, beyond browsing the page.

However, in this case, the victims were infected when they clicked to install something that is actually malware in disguise. Bad Rabbit used a fake request to install Adobe Flash as a malware dropper to spread the infection. The ransom was $280 in bitcoin with a 40-hour deadline.

Petya

Petya first appeared in 2016 and built upon the WannaCry ransomware. A year later, it resurged as GoldenEye. It spread through HR departments and fake job application emails with infected Dropbox link or attachment. But rather than encrypting specific files, this vicious ransomware encrypted the entire hard drive making it impossible to access anything on the disk.

Once encrypted, victims were required to pay $300 in bitcoin to get the decoding key.

Ryuk

One of the most recent ransomware that spread in 2018 was Ryuk. It disabled the Windows System Restore option, making it impossible to restore encrypted files without a backup. It also encrypted network drives. The ransomware caused a lot of damage and specifically targeted organizations that could afford to pay. Ransom payments gathered from the attack between 2018 and 2019 are estimated at $640,000.

GandCrab

Probably the most unsavory ransomware attack that hit the world in 2018, GandCrab threatened to reveal victim’s porn-watching habits. Claiming to have high jacked user’s webcam, criminals demanded a ransom, or otherwise they would make the embarrassing footage public.

Ransom requests ranged from $500 to $600. Since 2019, different variants of ransomware were in circulation as hackers constantly kept making changes due to increased cybersecurity.

Protection from ransomware

The reason why cybercrime is so dangerous is the fact that attackers are always anonymous, using multiple ports and thus difficult to track down. To protect from ransomware, people can do the following:

• Keep the operating system patched and up-to-date. This will ensure that your computer and system has fewer vulnerabilities to exploit.

• Don’t install software or give administrative privileges unless you know exactly what it is and what it does.

• Since email is the most common way to infect a system, never open or download attachments from an unknown source or sender. Moreover, double-check with the sender if the email is, in fact, coming from them.

• Install antivirus software that can detect malicious programs likes ransomware. Additionally, whitelisting software can be installed to prevent unauthorized applications from executing in the first place.

• Large business and organization owners should contact security agencies designed specifically to combat ransomware.

• Back up your files frequently. It may be tedious work and won’t stop ransomware, but it can minimize the damage caused.

Must Have Apps To Keep Your Child Safe From A Distance

0

There is one thing that parents can never compromise on. The safety of their kids. Be it online or offline, children are more vulnerable and more susceptible to attacks. It is impossible to always be with your children to safeguard them from inappropriate content on the internet or to know when they might be in danger during playtime or school hours.

To bring this more into perspective, here are a few stats:

· 9 out of 10 children between the ages of 8 and 16 have seen online pornography.

· According to law enforcement officials, more than 50,000 sexual predators at a given moment.

· Children between the ages of 12 and 17 are the largest consumers of internet porn.

Do you understand how grave the situation is? But this doesn’t mean that parents should restrict their kids from using the internet, for that matter. But as a parent, this can become a difficult choice. That is why most parents opt to use some

type of child protection apps that lets them keep an eye on their children even from a distance.

What Are Child Protection Apps?

There is quite a wide variety of child protection apps available in the market. Some apps help you regulate and monitor your child’s Internet usage and some provide real-time monitoring of their location and schedules. Both types of apps have a high demand and more and more parents are inclined towards them to help secure their children’s safety online and offline.

Here is a rundown of some trending child protection apps.

Kaspersky Safe Kids

In a 2018 report by Kaspersky Lab, it has been observed that the most number of web browser searches made by children were for video content, comprising about 17% of the total searches made.

While most of the content may be harmless, one cannot ignore the possibility of children stumbling upon age-inappropriate content. The highest number of Google searches made by children is in the order of video contents, followed by translation searches, communication and then games.

While the data could vary a little bit based on languages and the cultural background of each group of children, it remains a fact that children potentially end up watching inappropriate or traumatic video content even through an innocent search as around 22.4% of harmful content comes from video and audio-related sites.

Kaspersky’s Safe Kids provides a safe browsing environment for kids when they use the internet. It blocks off potentially harmful content and websites. Parental control allows you to filter online content, manage other app usages and screen time.

The premium version has additional features like geofencing alerts and tracking of battery level, call, text and social media. The app though available in iOS has limited features but works great with Macs, PCs and Android platforms.

Qustodio

Qustodio is a child protection and monitoring app that works across platforms and can be used to manage your child’s internet and app usage across multiple devices and platforms. You can set time limits on app usage and monitor texts and calls. The service starts at $54.95 for five devices per year.

Google Family Link

If anyone understands how search results can go out of hand, it has to be Google. That’s why Google has a free parental control solution that helps parents control their children’s internet habits.

Google Family Link lets you create a special Google account that you can give your kid to access Google services but lets you have the control over how much they can use it. You can set app usage time limits, screen time limits and approve or block app downloads and also perform remote locking to enforce a curfew. The service lacks location tracking features and can only be used on Android platforms.

Norton Family Premier

Norton is a popular anti-virus software company. Their solution to providing parental control comes in the form of Norton Family Premier, an all-around service that provides parental control features like blocking websites, tracking browsing history, limiting screen times, remote locking of devices, real-time location tracking, text message monitoring and so on. The only drawback is that it has a limited feature set on the Mac and iOS platforms.

Xplora2

Xplora2 is a gadget-cum-app that lets you track the live location of your child. It is a watch with an embedded GPS tracker that can sync up with your mobile app to provide accurate location details. It does not require a SIM card to work and is super reliable. This device is particularly useful for younger kids and helps you find them if they ever get lost wandering off or play near to potentially dangerous environments.

You can also create alerts to warn you when your child leaves a particular location, for example, from school or their friend’s house. It can also be integrated with Amazon Echo and respond to Alexa voice commands.

It costs a one-time purchase fee of about $170 and no monthly subscription charges. Just remember to tell your child to never lose the watch ever.

Famisafe

Famisafe is another GPS tracker app that allows you to check the real-time location as well as location history. It is available on both Android and iOS platforms and comes under several paid subscription plans, $4.99 per month annually, $9.99 per month or $6.66 per month quarterly.

Jiobit

Jiobit is a specialized location tracker device parents can make use of to track their child’s whereabouts in case the child doesn’t have or has lost their smartphone. This small GPS tracker is just 55mm in size and weighs 18 grams. It looks like a guitar pick with a small loop on one side that you can attach to keychains, bag straps or even shoelaces easily.

Life360

Life360 offers GPS tracking facilities along with the ability to add in more family members to coordinate plans. You can also get alerts on a low battery on your family member’s phone.

GPS trackers can essentially be used to monitor not just kids but also adults with disabilities and mental disorders and make sure they stay safe.

A Quick Review of the Leading Podcast Players

0

What is your favorite podcast?”, seems like a great opening line nowadays to start a conversation and get to know someone. Podcasts are trendy and there are over 1,000,000 shows available with more than 30 million episodes as of April 2020. Growing interest in this audio format has also sparked the development of more podcast players and apps that support this media.

Podcasts are not new. The idea of creating downloadable audio files was first developed by the tech entrepreneur Tristan Louis in 2000, when explaining the possibilities of RSS feeds, and was later built on by the software developer Dave Winer. However, it wasn’t until 2004 that users started to catch on.

The modern podcast experience involves good software —podcatcher— that can smoothly reproduce shows and episodes, has an attractive layout, and offers valuable features for listeners on their favorite devices, usually a smartphone. Here’s a quick review of leading podcast players in the market:

Spotify

Last year, this audio streaming company made a huge investment that is paying off. Spotify spent $500 million in May 2019 on podcasting, and is now one of the leading podcast platforms in the market. Along the way they’ve acquired Gimlet Media—a digital media company and podcast network— and Anchor, an app that helps users create podcasts.

Spotify recently reported 286 million monthly active users, an impressive number considering growth from June 2019 at 108 million, and has been leaving Apple Music’s demographics far behind since 2018. People who are already familiar with the platform can easily reproduce music and now podcasts on this freemium app. Spotify’s engaged audience has played a key part in their podcasting success, and they currently offer users a library of around 700,000 podcast shows.

This platform’s catalogue and reach are wide. Their interface is friendly, easy to use, and still continues to be developed, but most of their users won’t have to relearn how their podcast streaming offer works. The app is compatible not only  with popular operating systems such as Android, iOS, Windows, and Mac, but also different types of devices including game consoles, TVs, smartwatches, car stereo systems and speakers. However, to really take advantage of its features, clients should try out extended plans starting at $4.99.

Pocket Casts

This platform, created by Australian developer Shifty Jelly, was made specifically for podcasts and later purchased by a group of public radio stations—NPR,  WNYC Studios, WBEZ Chicago, and This American Life— in 2018. The company’s mission is “to create the world’s greatest podcasting experience” and they have invested all their efforts in high-quality sound, usability, and design.

Pocket Cast is available for download in the App Store and Google Play for free. Those who really want to take advantage of its features should consider the premium version that costs $0.99 a month or $10 a year. The latest version allows registered users to search for episodes, keep track of their listening history and customize their experience through reorganizing the toolbar, creating episode groups, importing files, and changing their interface appearance.

Podcast fans of Pocket Cast can benefit from an account by having a platform exclusively for their favorite shows, adapted to their podcasting needs, while accessing personalized suggestions of new shows and episodes available.

Overcast 

The first thing to note about this podcatcher is that it has been designed exclusively for iOS. Overcast was created by iOS developer Marco Arment and, in the past few years, has won first place in technology magazine reviews as the best podcast app for iPhones. The app is also compatible with iPads and iWatches. While users can register for free, the app is financed by publicity banners or advertising, but the Premium version can hide these for $10 a year.

Besides the interface’s pleasant appearance, one of the app’s highlighted features is the Smart Speed button that, while playing an episode, can automatically “edit” the audio to cut out silence and gaps, speeding-up reproduction without affecting a show’s content. Also, the Voice Boost feature can smoothly equalize voices and improve the quality of the playback production. This is especially useful for those who enjoy listening to amateur podcasts shows with interesting content but poor production quality.

Castro

Castro entered the market in 2013 and is currently only available on the App Store. This app focuses on simplicity and includes similar features to Overcast for users who’ve paid for a subscription: a silence-trimming function and a voice enhancing option. It also allows users to easily import their favorite podcasts from their Apple Podcasts app. This premium version costs $19 a year.

In addition, Castro includes a dynamic storage option to organize episodes and presets to automatically download or stream others. This is particularly valuable for those who enjoy listening to a large variety of podcasts.

Castbox

This Hong Kong-based company was founded in 2016 and is both a podcast player and content creator, with their own original shows such as This Sounds Serious. Castbox is free and available both on the App Store and Google Play, and adapts to almost every device, including Amazon Alexa, Android Auto, Google Home, and Carplay. Last year, it was also integrated with Waze, making it easier than ever for drivers to use basic playback controls.

Castbox stands out for its audio searching tool that categorizes and organizes over 95 million episodes to allow users to quickly find the perfect show. The app also offers a paid subscription option for $9.99 a year that hides publicity, allows unlimited podcast subscriptions, and permits members to try new features before everyone else.

Takeaways

Podcast fans have many options readily available that are undoubtedly a lot better than the standard pre-installed apps on their smartphones. There are many similar features among the best podcatchers, but each one includes special features that best adapt to each listener’s needs, devices, and particular lifestyles.

A casual podcast listener could be easily satisfied with Spotify, but probably a podcast addict would prefer a specialized platform like Overcast for his or her iPhone, or Pocket Cast for their Android device.

Autonomous Vehicles The Future Day Cruiser

0

Not long ago, autonomous vehicles (AVs) were a thing from sci-fi movies. But the rapid development of technology and revolutionary progress in the modern-day world has changed that. The concept of the self-driving car is no longer a product of fiction, but a work of reality.

However, the new digitized vehicles need an enhanced manufacturing process, extensive supply chain, and infrastructure that’s prepared specifically for them. In addition, the consumers, manufacturers, and global infrastructure will determine the future of AVs populating urban streets.

What are Autonomous Vehicles?

Autonomous vehicles or self-driving cars are a form of a robotic car capable of sensing and perceiving the surrounding environment with a variety of different sensors. Technology like radar, LIDAR, sonar, GPS, odometry, and inertial measurement units are used. The vehicles also have advanced control systems to interpret sensory information in order to react properly and navigate through different paths and obstacles. These cars require little to no human input.

Autonomous vehicles come with different levels of autonomy that are defined by the International Society of Automotive Engineers:

• Level zero has no automation and are conventional vehicles that require a driver at all times.

• Level one has driver assistance and includes commonly available technology such as cruise control and parking assist.

• Level two has partial automation and includes Tesla’s autopilot, where the car can take over the pedals and the wheel at the same time.

• Level three has conditional automation and require human drivers just as a backup for an autonomous system that operates under certain conditions.

• Level four has high automation and includes vehicles like Google/Waymo test cars that can be driven by a human but can also function properly without a human driver. Level four autonomous vehicles can safely park itself and navigate completely on its own.

• Level five has full automation and requires no human driver input whatsoever. These vehicles do not need a steering wheel.

Autonomous vehicle types include private passenger vehicles, buses, shuttle buses, light rail, aerial, and sidewalk drones. Like all new technology, autonomous vehicles come with a variety of benefits and negative impacts.

Positive and negative aspects of AVs

As self-driving cars are becoming a reality, people have expressed more interest in the technology. And while AVs are covered in numerous public debates, it is still difficult to predict all of the positive and negative outcomes of this technology.

Experts so far agree that the potential benefits of autonomous vehicles are fewer traffic deaths and injuries that are caused by driver error. Additionally, it will lead to more efficient vehicle movement, increased mobility for people with disabilities, seniors, and children, and there will be less land area needed for parking spaces.

However, increased usage of AVs may lead to negative health impacts. If AVs successfully transition to personal use, people may walk less. Furthermore, it will lead to job losses as there will be no need for the bus, truck, or car drivers. And as with all new technology, there is a big concern regarding privacy, data security, and personal safety.

Autonomous vehicles will undoubtedly change our cities and regions, but there are still numerous questions left unanswered. In addition, autonomous driving will never take off without the right infrastructure.

What kind of infrastructure is needed?

KPMG International has created the Autonomous Vehicles Readiness Index for assessing countries’ openness and preparedness for self-driving cars. Among the key criteria are policy and legislation, technology and innovation, consumer acceptance, and infrastructure.

The unstoppable progress of the automotive industry has an increasing effect on infrastructure, and it is becoming more and more apparent. Authorities and independent developers have thus agreed to make updates to infrastructure as an essential part of the current wave of urban transformation. First and foremost, autonomous vehicles require excellent roads and harmonized regulations. There are special standards required for the construction and renovation of roads. On-road telematics, lanes, signage, crash barriers, sidewalks, and curbs need to become smarter. Unfortunately, all of this is very expensive, and governments are still reluctant to make a big move.

The following infrastructural changes are a must if autonomous vehicles are to become a part of our everyday lives:

• Roadside sensors: City planners should include roadside sensors on lanes, curbs, and sidewalks when designing new roads. These sensors will allow autonomous vehicles to foresee dangerous and unexpected situations far ahead and react appropriately.

• Machine-readable signs: The technology implemented in AVs use an image recognition approach when reading road signs. If autonomous vehicles are to become our future, signs will have to be embedded with machine-readable code, which will be transmitted or broadcasted. This code will be invisible to humans, but detectable by computers.

• Lane markings: The automotive industry is already making more sophisticated sensors and maps, but poor road markings are stopping the full implementation of self-driving cars. The technology requires machine-readable and radar-reflective lane markings that will be clearly detectable even at night and poor weather.

• Support facilities: Autonomous vehicles will require equipped and well-managed support facilities to service and charge AVs. To avoid congestion, AVs will need a location where they can idle when picking up or discharging passengers. Experts predict that autonomous vehicles will accelerate the shift to electric vehicles. This requires additional investment and maintenance of electric charging stations on public roadways. All of these facilities need the thoughtful placement to avoid disrupting the urban environment and damaging traffic and civic life.

• Mobility hubs: For AVs to flourish, customers must be able to transfer seamlessly between their destinations. Transportation from point A to point B has to be reliable and without delays. To improve this, authorities need to invest in mobility hubs where passengers can share transportation if they are going in the same direction. These hubs will also have micromobility transportation services such as electric scooters or bikes.

According to the American Planning Association, governments and companies have to start preparing communities and cities for the inevitable arrival of autonomous vehicles. In their extensive report, they give comprehensive plan standards for sustaining places and AVs. This includes:

• Livable Built Environment: Provide complete streets serving multiple functions;

• Harmony with Nature: Enact policies to reduce carbon footprints;

• Resilient Economy: Plan for transportation access to employment centers;

• Interwoven Equity: Provide accessible, quality public services and facilities to minority and low-income populations;

• Healthy Community: Plan for increased public safety through the reduction of crime and injuries;

• Responsible Regionalism: Promote regional cooperation and sharing of resources;

• Authentic Participation: Develop alternative scenarios of the future;

• Accountable Implementation: Establish implementation indicators, benchmarks, and targets;

• Consistent Content: Assess strengths, weaknesses, opportunities, and threats;

• Coordinated Characteristics: Be innovative in the plan’s approach.

Everything You Need To Know About Power Line Communication

0

Power Line Communication (PLC) is the communication technology that uses the existing public and private wiring for transmission of signals. PLC signals and high-speed data are transmitted over low-voltage power lines. This means that with just power cables running to an electronic device, users can power it up and retrieve data from it.

Over the past few years, signal processing technology saw a rapid rise in the development of modem chips that are able to overcome any transmission difficulties. This includes the sending of communication signals over electrical power lines. In addition, it supports PLC technology to allow Internet access through transmission lines. This technology is referred to as Broadband over Power Line (BPL).

What is Power Line Communication?

Power Line Communication works the same way as any other electric communication system. It carries data using the same existing network of wires from one end to the other end. In other words, PLC uses the same conductor as AC electric power transmission or electric power distribution to customers.

Most PLC technologies and companies try to limit themselves to only one type of wires. These are premise wiring that can be found within a single building. In rare cases, PLC can cross between two levels like premise wiring and distribution network. Generally speaking, there are four types of Power Line Communication:

1. In-House networking: By using In-House power wiring, users are ensured high-speed data transmission.

2. Broadband over Power Line: With outdoor mains power wiring, broadband internet access can be offered to customers.

3. Narrowband In-House applications: Through In-House power mains, low bit rate data services like home automation and intercoms can be controlled and used for communication.

4. Narrowband outdoor applications: For automatic meter reading and remote surveillance or control, the narrowband outdoor application can be used.

How does Power Line Communication works?

Like other communication technologies, PLC also consists of the sender and receiver. The sender modulates the data that is to be sent through a communication medium, while the receiver demodulates the data for further use. Apart from sending signals for communication, PLC allows users to control and monitor all the connected devices to the power line. This is possible because everything is implemented in the same wiring system.

PLC is widely used for transmitting radio programs, control of switching mechanisms by the utility company, transmission line protection, and automatic meter reading. PLC signal comes with low frequency and high frequency. Low frequency is anywhere from 3KHz to 150Khz, meaning data transmission is at low bit rate but longer range. High frequency is from 1MHz to 100MHz and allows transmission in broadband, but reduces the range.

The advantages of PLC are low implementation cost as it requires no new wires and large reach, which enables communication with hard-to-reach nodes like underground structures and metal walls. Disadvantages of PLC are low transmission speed, sensitivity to disturbance, and the high price of capacitors and inductors.

What is Broadband over Power Line?

Broadband over Power Line (BPL) is, in fact, a method of Power Line Communication. The technology allows for high-speed digital data transmission over the public electric power wiring. BPL uses higher frequencies and a wider frequency range to provide high-rate communication. A significant number of components make up the power distribution grid. All of them are aimed at delivering electricity to customers. Recent technological advancements have led to the development and implementation of a new system that made it possible to deliver broadband services. These systems are comprised of:

• Access BPL

• In-House BPL

Access BPL uses electrical transmission lines to deliver broadband to the customer’s home. It relies on injectors, repeaters, and extractors to deliver the high-speed broadband service. In-House BPL is broadband access within a building using the electric lines of the structure to provide the network infrastructure. Sometimes it can be a combination of both.

The biggest difference between the two is that In-House BPL utilizes the electric wiring in a privately owned building, while Access BPL uses electric power lines owned, operated, or controlled by an electricity service provider. As mentioned previously, BPL technology is designed to provide short-distance communication solutions.

How does Broadband over Power Lines work?

At a high level, the BPL network consists of three key segments: the backbone, the middle mile, and the last mile. BPL vendors are primarily seeking to address the last mile segment in order to successfully make way into customers’ homes. From the user perspective, BPL works by sending high-speed data along medium or low voltage power lines into the customer’s home. The signal traverses the network either through the transformers or by using bridges and couplers. The user only needs to plug an electrical cord from BPL modem into any electrical outlet, then plug an Ethernet cable into an Ethernet card on their PC.

Where is the technology applied?

Power Line Communication is mainly used for telecommunication and telemonitoring between electrical substations. Additionally, it is widely used in technologies like Smart Grid, Advanced Metering Infrastructure, and micro-inverters. Medium frequency PLC is used in homes to remote control lighting and appliances without installation of additional wiring. If the technology continues to evolve and is presented to wider audiences, it will have more adaptation and application. It could be used for traffic light control, have industrial application for irrigation control, machine-to-machine applications like vending machines, telemetry applications like offshore oil rigs, transport applications like electronics in cars, trains, and many more.

BPL opens up exciting possibilities for the future and is currently used in all smart homes or smart rooms. These homes, or even hotel rooms, have various appliances that are switched on and off automatically. However, wider usage is still uncommon. Access BPL failed to gain momentum in various countries that tried to implement it on a larger scale. Failure is attributed to limited reach, low bandwidth, usage of traditional broadband, routers and modems, and BPL incompatibility with mobile devices.

Companies at the forefront of this technology

Power Line Communication market is still growing, and major driving factors behind it are cost-effective installation, enabling wide coverage by using existing electricity distribution network, growing deployment of smart grids, and high penetration of Broadband over Power Line communication.

Key market players and companies at the forefront of this technology are:

• Siemens AG from Germany

• NETGEAR from the United States

• ABB from Switzerland

• AMETEK from the United States

• Schneider Electric from France

• General Electric from the United States

• Hubbel Power Systems from the United States

• TP-Link Technologies from China

• D-Link from Taiwan

• Landis+Gyr from Switzerland

• Belkin International from the United States

• Devolo from Germany

• Zyxel Communications from Taiwan

Get Over The Civilian Drones, Commercial Drones Are Here

0

Each generation has a vision of what the future would be like. We may not yet have flying cars as our older generations expected but we have the coolest gadget ever to fly on our command. Drones, also called Unmanned Aerial vehicles (UAVs) or the Flying Mini Robots, are the newest technological innovation that by the looks of it is here to stay and become an integral part of life.

While the adoption of drones for commercial usage is still at its initial stages, the future of drones industry seems bright with people discovering new ways to apply the use of drones to solve their everyday problems.

Here are some commercial civilian usage scenarios which have enabled the drones industry to widen their market.

Commercial Usage Scenarios of Drones

Agriculture

Drones have found a multitude of use cases in the field of agriculture. It helps farmers take pre-emptive actions by monitoring and identifying crops that are failing. By using drones, farmers can easily identify failing crops early and save a lot of money. They are also useful in monitoring farm animals and provide convenient surveillance that can cover a huge area as that of a farm.

Drones can be of immense help in managing crop inventory, map the farmland and its irrigation systems and get an overview of the condition of the crops quickly.

Drones can also be customized to help in farming. With a little customization, they can be easily used to spray pesticides, fertilizers, and water over the crops.

Construction

Architecture and construction industries are already the topmost users of drones. Drones can be of great help in formulating the 3d model of structures and buildings that these firms wish to build.

Drones are a great way to get cheap and quick aerial shots which are indispensable for these firms to make accurate 3d renderings that fit well on the environment the structures are to be built. They can also be used throughout the construction project to help assess the progress and accuracy of the project undertaken.

Delivery

Drone-based delivery systems were proposed by Amazon in 2016 and are currently under the development stage. It is only a matter of time that drones will ease up the online delivery process.

While a wide-scale application of such a delivery system would require more advancements in technology and guidelines, it will be the go-to method in remote places where traveling by roads is impossible or difficult.

Emergency Services

Drones are already employed by emergency responders for operations like search and rescue, distributing medicine and food to stranded victims. It can be of huge help during natural or manmade disasters to assess the damage levels and send a form of food or medic relief to affected people.

In Boston, drones were used to successfully locate a rape victim and her attacker. A dementia patient who got lost was also identified by using the thermal sensors in the drone. Drones will be an essential part of timely rescues given their ability to cover wide areas and sensor components that can identify the required entity with accuracy.

Engineering

Mining sites, oil pipelines, and projects that involve setting up transmission cables can all derive huge benefits by making use of drones. Any kind of engineering and infrastructure projects will have ample usage of drone technologies starting from exploration, surveying to assessing the progress.

Environmental Conservation

The best way to observe and monitor wildlife and ecological hotspots would be to make use of non-invasive drone technology. Drones help in monitoring wildlife without disturbing them. It helps gain insights into the effects of conservation efforts, migration tracking, and flood assessments.

It can be the tool scientists have been long looking for to explore and identify new species like deep caves where manual reach is impossible.

They are also used in the geographical mapping of inaccessible terrains.

Wireless Internet

This is a novel way to make use of drones and is already in works by major corporations. Facebook has proposed a plan to make use of drones to provide wireless internet connectivity. Google and Amazon are also entering the race with huge investments made in the drone industry. Internet is indeed a hot commodity and with drones appearing as a promising part of delivering internet access worldwide, everyone wants to try their hands on drones.

Media

Media houses have developed a huge interest in drones as drones can be great in newsgathering and media coverage. Big names like The New York Times and CNN have set up dedicated teams to deal with drones’ usage in covering news stories. The New York Times, in particular, made use of drones to depict the impact of the Syrian Civil war.

Commercial Drone Industry Leaders

While the industry is still young, it is growing quite rapidly with major corporations showing more interest in developing more drone technologies to enhance their existing business models. It has been estimated that the drone industry could amount to $82 billion in value and provide 100000 jobs in the US by 2025.

Right now, the companies leading the pack in the drone technology are

· DJI innovations

It is a Chinese private enterprise that manufactures about 70% of civilian drones. In addition to manufacturing drones, the company is also known for a range of other products like flying cameras and more.

· Ambarella

Ambarella is a US-based company that manufactures drones with HD and UHD video capabilities along with other consumer products.

· Boeing

Boeing is an aircraft industry leader ventured into drones with the acquisition of Liquid Robotics.

· GoPro

The company specializes in high-quality photography drones and targets hobbyists, professionals, and adventurists

The Wrap Up

It is interesting to witness significant developments in the drone industry. It would be even exciting to see how things unfold shortly. We are hopeful that in addition to being used for entertainment purposes and as a hobby, drones will find a multitude of other applications as well for commercial purposes.

Microplastics: An Unknown World At The End of Your Fingertips

Plastics have been a source of innovation-driven growth since the 1950s. Their unique properties have a promising future even today, as it is in high demand and central to modern-day living. Sadly, their use has become tainted by the unrelenting rise of plastic pollution. Irresponsible human behavior is largely to blame for this. 

Each year, humanity produces about 300 million tons of plastic. Out of this, about 8 million tons end up as waste in our environment. These are the remains of car tires, water bottles, shopping bags, children’s toys, packing, cosmetics, and even fibers from synthetic clothing. 

The danger posed by larger, floating pieces of plastic is apparent. Wildlife can get easily entangled in these items and drown or even choke to death. And the fragments of plastic that aren’t swallowed by animals end up battered by the elements until they become tiny particles called microplastics.

And while these particles may be small in size, they have a massive influence on natural ecosystems. So what exactly are microplastics, and how do they impact our world and humankind as a whole?

What are microplastics?

Microplastics are not a specific kind of plastic. They are, in fact, any type of plastic fragment that is less than five millimeters in length. Due to their small size, they are hard to detect and can enter natural ecosystems from a variety of sources. These often include cosmetics, clothing, or industrial processes. 

There are currently two classifications: primary microplastics and secondary microplastics. Primary microplastics are any particles that are already five millimeters in size before entering the environment. They are purposefully manufactured and used in facial cleansers, cosmetics, clothing, and airblasting technology.

Secondary microplastics are created from the degradation of larger plastic products like water and soda bottles, fishing nets, and plastic bags. They enter the environment through the natural weathering process. The culmination of physical and biological degradation and exposure to sunlight can reduce the structural integrity of plastic debris to a size that is eventually undetectable to the naked eye. This process of breaking down large plastic material is known as fragmentation.

Plastics degrade slowly, often over hundreds or even thousands of years. This increases the probability of microplastics being ingested and incorporate into the bodies and tissues of many living organisms.

How do microplastics impact us?

Research on microplastics and their threats to ecosystems and humans is still at its beginning. It is also a very complex field, and scientists are yet to understand the cycle and movement of microplastics in the environment. Furthermore, experts are still trying to fully analyze to what degree microplastics harm living organisms. One thing that they agree on is that the concertation of microplastics is huge, but the incredibly small size of particles is very difficult to detect. 

There is a consensus that microplastics can enter the body tissues of aquatic animals and humans alike. Since humans get a great deal of their food from water, plastic became an inescapable part of our own food chain. In 2017, Orb conducted a world study on tap water and revealed that 83% of the samples contained microplastics.

Besides the harmful impact it has on our environment and planet, microplastics can alter oxygen levels in body cells and cause a physical gut blockage. Moreover, when these particles don’t kill animals outright, they reduce energy levels and their feeding or mating behaviors. This leads to a dangerous population drop-offs in some areas. These particles can also absorb, concentrate, and carry other chemicals in the environment. They are known as PBT or persistent, bio-accumulative, and toxic chemicals. Chemicals like this can have a massive effect on cell and tissue function.

And while scientists are working hard to understand the influence and impact of microplastic waste, the question is no longer whether changes are needed. It’s how quickly technology can provide a valuable and sustainable solution.

 

Technological and scientific ways to deal with microplastics

Since the research on microplastics is still at its infancy stage, technological ways to deal with them are few. 

One solution involves a biological catalyst or enzyme which has demonstrated an ability to greatly reduce the time required to break down plastic. It’s called PETase, after PET plastics. What it essentially does is eat plastic. Scientists found this enzyme by accident in Japan. Once its properties have become apparent, they refined its structure and have made it more effective at breaking down plastics than any other known catalyst in nature. However, there still isn’t a known way to deploy this molecule to fight plastic already present in nature. At the current stage, scientists are involved in applying and incorporating it into the recycling programs.

Other scientists are concentrating their efforts on designing and deploying physical structures to gather plastics from waterways near populated areas. Based on extensive research and computer modeling, scientists believe they could remove about 31% of microplastics from coastal areas by installing collection brooms near population centers. The focus on coastal areas is a priority due to its connection to marine life.

Another proposal for breaking down microplastics that is already in the environment comes from the Swedish Royal Institute of Technology. It involves something called nanocoating. When deployed on the surface of the plastic, nanocoating helps it degrade using nothing but natural or artificial sunlight. This process is called photocatalysis and uses zinc oxide nanorods. The more immediate application of this technology includes manufacturing plastics with this coating already applied to it to destroy any future microplastics.

 

Reducing and reusing plastic waste

Most technological advancements are still in the testing phase, so the best way to counter microplastic pollution is to reduce the production of new plastics altogether where possible. Incorporating plastic pollution into public debates is a must to raise social awareness of the problem. There are already several examples of a successful reduction of plastic waste or even reuse of discarded plastics in order to create other products. This is called upcycling and saves natural resources and reduces ocean plastic pollution.

Possibly the most established way of avoiding plastic waste is in the form of container deposit fees. In Sweden and Germany in particular, this has shown to be a highly effective way to reduce the amount of waste in the environment with return rates high as 90%. Deposit return strategies are considered more efficient because of the monetary incentive for recovery.

Collectively, all strategies help reduce the leakage of single-use plastics and subsequent formation of microplastics from their degradation. For now, their reduction remains the most efficient mitigation effort to reduce microplastics in the environment.