LG starts selling 80000 Euos OLED roll-up TV that disappears at the touch of a button: if you want it, prepare more than 80, 000 euros.
The future is now. LG has just put on sale its new roll-up TV.
Of course, if you want it, prepare more than 80.000 euros.
The new LG Signature OLED R TV RX may not look like a TV at first. It more resembles a living room furniture. The thing changes when it is discovered that from that piece of furniture a 4K screen of up to 65 inches unfolds.
LG Electronics has started the commercialization of this product that it presented at CES 2019 and that has already been awarded for its innovation. The Korean is distributing this model of roll-up TV only in some luxury stores of the Asian country.
LG starts selling 80000 Euos OLED roll-up TV
Of course: its starting price reaches 100 million won, the local currency, which at the current exchange rate are about 87,000 dollars and about 80,000 euros. This has been confirmed by the electronics in a statement published this Tuesday. It is not a device within reach of anyone.
The LG Signature OLED R TV RX can be fully deployed to watch TV or play the console, or just unfold an area of the screen to use the appliance as a sort of Home dashboard.
As ZDNet explains, the' piece of furniture ' in which the screen is protected is made of aluminum and includes speakers covered with a fabric made by the Danish design firm Kyadrat. Customers can have their name engraved on this fabric.
The roll-up screen was introduced by LG at CES in 2018, while the first complete TV with this technology was announced in 2019.
At last the price of this new TV has been known, which to date, and as recognized by LG, would start from about 60.000 dollars. At the moment it is not clear if it will arrive in Spain, and if it does, at what price.
LG starts selling 80000 Euos OLED roll-up TV
Endesa mitigates a cyberattack attempt that failed to access any sensitive data from customers or workers: why now it can't let its guard down
Endesa has suffered a cyber attack but its defenses have successfully repelled it.
Sources familiar with the incident have explained to Business Insider Spain that the computer attack has not managed to penetrate neither workers 'nor customers' information, and that they have not even affected the company's customer service operations.
Portals such as Network law or Zonamobility have first reported on this incident, which from the company is downplayed. Sources of the same abound in that the experience gathered over these years have made it possible that the computer systems of the Electric have been able to successfully repel this attempt at meddling.
So much so, that only INCIBE has received information about the incident in order to be able to count it in its statistical reports. Having not penetrated the cyberattack in the personal information of customers or workers, the conflict has not gone to greater.
Sources close to the company point out that many workers were already working remotely through a virtual network (VPN) without any incidence since noon this Monday. El ciberataque habría tenido lugar entre la madrugada del domingo al lunes y el mismo lunes por la mañana.
From Endesa have confirmed that in the early hours of Monday a ransomware was detected in its internal network. "The company temporarily isolated the corporate network to be able to carry out all interventions aimed at eliminating any residual risk," he explains. The connection " was safely recovered at 09:20 on the same day." Investigations into what happened are still ongoing.
Those responsible for the company's cybersecurity have managed to repel this attack thanks to the experience gathered over the years in the field of cybersecurity, these same sources have stressed.
As zonamobilidad recalls, Endesa was the target of a cybercrime campaign that was detected 4 years ago, in 2016. Criminals spoofed electricity by sending fake invoices via email with the aim of infecting the computers of the company's customers.
In the mail was attached a type of ransomware whose purpose was to encrypt the files of its victims to ask for a ransom to be paid.
This time, Endesa has managed to control the gap and avoid further damage. Other Spanish firms that have suffered attacks recently have not been the same. An example is that of Adif, the public operator of rail networks. The collective that operates the Sodinokibi ransomware demanded a ransom in exchange for not leaking sensitive information.
Mapfre, the insurer, was also impacted by another ransomware collective.
Luis Corrons, Security Evangelist of the firm Avast, has emphasized that the Electric "is well prepared for this type of attacks and has good security practices".
But he has also riveted that the next step the firm will have to take is that "it will need to invest time and resources in a forensic analysis to trace the attack back to its original source." The expert notes that these types of ransomware attacks are "the final step in a chain of events of a threatened computer network".
"This means that the attackers could have been in the system for a while," he warns. "The Endesa security team will need to understand for how long, what they did during this period and why there were no indicators to detect their presence before."
"This will take time, but it is a critical process. Otherwise, the door will remain open for the same thing to happen again in the future."