ADVFN Logo ADVFN

We could not find any results for:
Make sure your spelling is correct or try broadening your search.

Trending Now

Toplists

It looks like you aren't logged in.
Click the button below to log in and view your recent history.

Hot Features

Registration Strip Icon for charts Register for streaming realtime charts, analysis tools, and prices.

KMK Kromek Group Plc

7.25
-0.25 (-3.33%)
26 Apr 2024 - Closed
Delayed by 15 minutes
Share Name Share Symbol Market Type Share ISIN Share Description
Kromek Group Plc LSE:KMK London Ordinary Share GB00BD7V5D43 ORD 1P
  Price Change % Change Share Price Bid Price Offer Price High Price Low Price Open Price Shares Traded Last Trade
  -0.25 -3.33% 7.25 7.00 7.50 7.55 7.25 7.55 681,334 13:44:24
Industry Sector Turnover Profit EPS - Basic PE Ratio Market Cap
Miscellaneous Metal Ores,nec 17.31M -6.1M -0.0102 -7.11 43.52M
Kromek Group Plc is listed in the Miscellaneous Metal Ores sector of the London Stock Exchange with ticker KMK. The last closing price for Kromek was 7.50p. Over the last year, Kromek shares have traded in a share price range of 3.15p to 8.25p.

Kromek currently has 600,247,000 shares in issue. The market capitalisation of Kromek is £43.52 million. Kromek has a price to earnings ratio (PE ratio) of -7.11.

Kromek Share Discussion Threads

Showing 1651 to 1671 of 7250 messages
Chat Pages: Latest  74  73  72  71  70  69  68  67  66  65  64  63  Older
DateSubjectAuthorDiscuss
04/8/2017
11:33
Morning all, they do have other products that they are marketing , but have no news on them either, I'm surprised that they are not monitoring the share price and understand that the decline can fast go down hill without any form of news, updates and ultimately contract news, if the big share holders start to get impatient then this could tank fast.I sold out last week, but only hold 5k of shares now, happy being out than in now.
jasonblue66
04/8/2017
08:41
Looks like 26.5p is calling. Come on Kromek it's gone awfully quiet, we need som contract news!
pistonbroke1
28/7/2017
08:21
Re the second article where 3 companies are indeed named ............they make it clear KMK is not one of them as it has NOT been tested.
This does not mean it cant be hacked.
It means they did not TEST KMK devices.
Reading both the articles makes it seem pretty certain that KMK uses similar protocols and tech.
If they cant be hacked then why have KMK refused to say they cant be hacked when they told me they would address this matter.

MAYBE KMK devices cant be hacked but I am very far from being convinced.

That and no major deal being sealed makes this yet another jam tomorrow maybe next year lads company.

Its at a decent price right now so if it fails it has a long way to fall.
It can do so without my money.

chimers
28/7/2017
08:15
As an investor I try to mitigate risk.

KMK as an investment became way to risky.

The risk v reward scenario is no longer biased to the 'reward'

They failed YET AGAIN to deliver any meaningful orders when much was hyped that such orders were imminent.

That makes me question their veracity and their ability and their tech.

Still no orders of a meaningful description being delivered.
Maybe they can be hacked its another red flag.


Too Risky.

chimers
28/7/2017
08:11
I brought this matter up with KMK as a matter of extreme urgency .
They responded by stating they would address the issue in the next RNS their 'final results' and they ....DIDNT.
That tells me all I need to know as an investor.

chimers
28/7/2017
08:06
The article refuses to name ANY COMPANY.

But the article makes it clear that if you use RF protocols to communicate then it can be hacked.

Kromek's devices uses RF protocols to communicate dont they ?

chimers
28/7/2017
08:04
That article mentions three device manufacturers, not one of them is Kromek
briannewby
28/7/2017
08:02
Because they use RF protocols to communicate.
ANYTHING that uses RF protocols to communicate can be easily hacked.

Darkreading.com

"Nuclear Plants, Hospitals at Risk of Hacked Radiation Monitoring Devices
Security researcher discovers major security flaws that can't be patched or fixed.
Design flaws in devices used to monitor radiation levels in nuclear plants, hospitals, seaports, and at border controls, could be exploited by an attacker to inject phony radiation readings, a security researcher has found.

Ruben Santamarta, principal security consultant at IOActive, reverse-engineered the firmware of two different brands of radiation monitoring devices as well as analyzed their hardware and a proprietary radio frequency (RF) protocol used for communicating with those devices, and discovered major design flaws that leave them open for hacking.

The vulnerabilities are not your standard buffer overflows or other known classes of bugs, he says. "This research covers several design-level vulnerabilities," says Santamarta. "The vulnerabilities are related to the design of these devices and their radio protocols."

And the catch: there's no fix or patch that can remedy them, he says. "There's no solution for these issues," Santamarta says. "You can't patch them because it's the way they are designed."

Santamarta won't name the affected vendors or provide many of the technical details of his findings until his presentation on his research next month at Black Hat USA, Go Nuclear: Breaking Radiation Monitoring Devices. He says many other brands of radiation monitoring devices are also vulnerable to attack because they all use the same RF protocols for communications.

The RF protocol used for communicating to and from the devices both lack encryption as well as use weak encryption algorithms in cases where they do employ crypto, he says. "There were weak encryption algorithms for radio communications and for updates to" the device firmware, he says.

"In this [Black Hat] talk, I'm going to try to explain how to reverse-engineer an entire radio protocol, from physical to application layer," he says.

An attacker could wage a cyberattack on these devices as far away as 20 kilometers, he says. "You don't need to be near the facility to attack it," Santamarta says. And there are plenty of tools available for an attacker to jump onto the RF network. "The problem with radio is it's difficult to mitigate" an attack via it, he says.

The weak RF protocols and firmware could allow an attacker to inject fake radiation readings, so that if there were a radiation accident or leak, it couldn't be detected, for example. Or the reverse: it could send phony readings of high radiation levels when none were actually present, he says.

"Potentially false readers can trick operators into performing actions" that aren't correct if they incorrectly are alerted that radiation exposure has occurred, for example, he says. "An attacker could inject false readings into a nuclear power plant's radiation monitoring device simulating a massive radiation leak … How is the operator going to react?

"These are the worst-case" scenarios of attacks exploiting the design flaws in the devices and their protocols, he says.

So what can organizations using radiation monitoring devices do to prevent a cyberattack on the equipment?

"The best thing is to know that these attacks are feasible. The problem … is there are no solutions for the vulnerabilities. The only way to protect is to raise awareness of these attacks … and identify when they may be happening," says Santamarta, who will detail at Black Hat some methods of mitigating the potential impact of a hacked radiation monitoring device.

"It's complicated," he says.

The inspiration for Santamarta's research, he notes, were two famous nuclear facility incidents: the 1979 Three Mile Island nuclear plant core meltdown and the 2007 theft of fuel pellets of uranium oxide from a nuclear fuel facility in Spain. Three Mile Island's mechanical failure led to inconsistent radiation level readings to the plant's operators that ultimately exacerbated the accident, according to Santamarta.

"They were receiving false information," he says. "So I wondered, what happens if someone tries to send false information that's then consumed by operators? What could happen?"

chimers
28/7/2017
07:51
Chimers - I'm genuinely interested - what basis do you have for your claims that the Kromek's equipment can be hacked?
kamitora
28/7/2017
07:47
Its not that they wont be its because they CANT BE.

This is one of the main reasons Im out.
They have nothing.?
All that work, all these patents, and a 5yr old can hack them.?

This is why there are no mega orders imo.

chimers
27/7/2017
16:45
Vulnerable Radiation Monitoring Devices Won’t Be Patched

hxxps://threatpost.com/vulnerable-radiation-monitoring-devices-wont-be-patched/126967/

Anyone know why ADVFN wants to break links by changing http into hxxp?

kamitora
26/7/2017
16:13
Interesting all the buys today? Anyone seen anything?
basingblue
24/7/2017
16:31
Just another day.......more buys than sells , but hey let's mark it down.........zzzzzzzzzzzzzzzzz
jasonblue66
21/7/2017
12:30
77210 sells and 140k buys and price marked down.....just another day.....
jasonblue66
20/7/2017
09:41
30.499 are buys, 30.2525 are sells.

Little flurry of buys going through now pushing price up

pistonbroke1
20/7/2017
09:37
Looks like all buys so far this am..
susiebe
20/7/2017
01:12
Nope I agree with you, I saw this share as a great find, but now see this as a gamble, so not buying any more, I'll hold on with what I couldn't sell Tuesday , and take the small gamble, and what does or doesn't develop.My concern as I said before was in their accounts, they said they had enough to cover costs for at least for 12 months why say that if the money is going to pour in?I just now feel v uneasy about this, until news flow.
jasonblue66
19/7/2017
23:33
IDS='s I Did Say
chimers
19/7/2017
21:47
Another disappointing day......Hey Chimers have to ask ...IDS?Given the sells outweighing buys, and doesn't take much to mark down, this can fall a lot further , disproportionately to volume traded in my opinion , but a good buying opportunity for the med to long investor.My take on there being no news on new contracts, either it's not going as they had forecasted , i.e. Lost out on the ones they were working on or they are not allowed to release news on imminent contracts with governments due to confidentiality terms until signed.I like to think the latter, but they should think about issuing something coz I can't believe there's nothing happening with Kromek given all the products they are marketing and the markets they are targeting.Let's see if some big buys come in to support price.....
jpi_jason
18/7/2017
17:02
At a guess Chimers maybe disappointed, as I'm to be honest with Kromek, I sold some Friday and yesterday, leaving just 30k shares, tried to sell this morning before the drop but would not let me do it in one go, which wasn't the case on the other two trades, I guess there's not much appetite from the small investor so no takers so left it, only to see further drop.Going to be hard for further recommendations until there is contract news, plenty of hope, ambition etc coming out from them, visit of trump to eu RNS , target markets in the tens of millions etc etc, but I think they've used all that up for now, but they released an RNS step change mentioned and we all had hopes of an explosion in price based on their confidence. Well we have only got is to see the share price fall back, and the mm's can play with this share as they try and generate a buyers and sellers market,.I'll still hold on to my holding for now, and see what occurs this week, but will only buy back when news flow starts, or there's a good volume turn over.Good luck to all
jpi_jason
18/7/2017
15:19
Recent drops on low volume. Amazing how the price is dropped so easily, but I suppose the problem is that those of us that are in have enough shares at present, so we wait.

As you say pistonbroke1 "could really do with some news".

uapatel
Chat Pages: Latest  74  73  72  71  70  69  68  67  66  65  64  63  Older

Your Recent History

Delayed Upgrade Clock