Foxconn to soon announce second Japanese auto partner, chairman says
'There are two Japanese automakers; one has already been announced, and the other is almost ready to be,' Liu said at the company's annual shareholders meeting, without elaborating.
Foxconn subsidiary Foxtron Vehicle Technologies and Japanese automaker Mitsubishi Motors this month signed a memorandum of understanding for the supply of an electric vehicle (EV) model.
Foxconn views partnerships in Japan as a major opportunity for growing its EV business, Jun Seki, the Taiwan contract manufacturer's chief strategy officer for EVs, said at a Tokyo seminar in April.
The Apple supplier's interest in working with Japanese car makers comes as they face growing competition from Chinese brands that are aggressively making inroads in markets such as Europe, Brazil and Thailand.
Mitsubishi Motors is a junior partner in the long-standing alliance of Nissan Motor and French automaker Renault.
Foxconn has previously said it would consider taking a stake in Nissan for cooperation, as it has ambitions to diversify into EVs. Foxtron, the company's EV joint venture with Yulon, counts Yulon-owned Luxgen as its main client in Taiwan. REUTERS
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

Straits Times
6 hours ago
- Straits Times
Indian firm says it shipped non-military explosives to Russia
NEW DELHI - An Indian firm that shipped $1.4 million worth of an explosive compound with military uses to Russia in December said on Saturday it complies with Indian rules and the substance it had shipped was for civilian industrial purposes. Reuters reported on July 24 that Ideal Detonators Private Limited shipped the compound, known as HMX or octogen, to two Russian explosives manufacturers despite U.S. threats to impose sanctions on any entity supporting Russia's Ukraine war effort. One of the Russian companies listed in Indian customs data as receiving the compound is the explosives manufacturer Promsintez. An official at Ukraine's SBU security service has said the Russian company has ties to the military and that Ukraine launched a drone attack in April against a Promsintez-owned factory. Promsintez did not respond to a request for comment. Ideal Detonators said in an emailed response to Reuters that the material it shipped was not military grade. "The shipment ... is for industrial activity and it's a civil explosive," the company said. The U.S. government has identified HMX as "critical for Russia's war effort" and has warned financial institutions against facilitating any sales of the substance to Moscow. The U.S. Treasury Department has the authority to sanction those who sell HMX and similar substances to Russia, sanctions lawyers have said. Top stories Swipe. Select. Stay informed. Singapore Woman taken to hospital after car falls into sinkhole on Tanjong Katong Road Singapore Students hide vapes in underwear, toilet roll holders: S'pore schools grapple with vaping scourge Singapore 'I've tried everything': Mum helpless as son's Kpod addiction spirals out of control Singapore NDP 2025: How Benjamin Kheng is whisked from Marina Bay to Padang in 10 minutes by boat, buggy Singapore Almost half of planned 30,000 HDB flats in Tengah to be completed by end-2025: Chee Hong Tat Singapore From libraries to living rooms: How reading habits take root in underserved S'pore children Asia Thai-Cambodia clashes spread along frontier as death toll rises Asia Thousands rally in downtown Kuala Lumpur for resignation of PM Anwar HMX is widely used in missile and torpedo warheads, rocket motors, exploding projectiles and plastic-bonded explosives for advanced military systems, according to the Pentagon's Defense Technical Information Center and related defense research programs. The compound also has some limited civilian applications in mining and other industrial activities. REUTERS

Straits Times
11 hours ago
- Straits Times
Shunsaku Tamiya, who brought perfection to plastic race car models, dies at 90
Under the leadership of Mr Shunsaku Tamiya, Tamiya Inc won popularity worldwide for making kits that excelled in quality and historical detail. TOKYO – Mr Shunsaku Tamiya transformed his father's former sawmill into a leading manufacturer of plastic model kits, with a passion for detail that once led him to buy and disassemble a Porsche to make a perfect miniature version. He died July 18 of undisclosed causes at age 90. For more than four decades, Mr Tamiya led the company that bore his family's name, turning it into one of the world's largest makers of build-it-yourself plastic model kits of race cars and military vehicles. Since producing its first such kit in 1960, of the Japanese World War II battleship Yamato, Tamiya Inc has become a globally known brand that also produces remote-controlled cars. Under the leadership of Mr Tamiya, who replaced his father as the company's president, Tamiya Inc won popularity worldwide for making kits that excelled in quality and historical detail. In 1967, one of its miniature models so faithfully reproduced a Formula One racing car, down to the location of a starter battery beneath the driver's seat, that the maker of the original vehicle, Honda Motor, wondered if he had access to trade secrets but decided to let it pass. His pursuit of accuracy also once took him to the embassy of the Soviet Union in Tokyo, where he sought details about Warsaw Pact tanks. This drew the attention of Japan's public security bureau, which placed him under surveillance for a time. Mr Tamiya was serving as the company's chair at the time of his death. According to the company, he still enjoyed standing at the entrance to an annual trade show near Tamiya's headquarters in Shizuoka, a city south of Tokyo, to watch the children come in. 'He turned our city of Shizuoka into a world center of plastic models,' Mayor Takashi Namba told reporters after learning of Mr Tamiya's death. 'He also built a global brand. I truly respected him.' Although the company continues to produce model kits in Shizuoka, it also opened a factory in the Philippines in 1994. Top stories Swipe. Select. Stay informed. Singapore Almost half of planned 30,000 HDB flats in Tengah to be completed by end-2025: Chee Hong Tat Singapore Students hide vapes in underwear, toilet roll holders: S'pore schools grapple with vaping scourge Singapore 'I've tried everything': Mum helpless as son's Kpod addiction spirals out of control Singapore Black belt in taekwondo, Grade 8 in piano: S'pore teen excels despite condition that limits movements Singapore As Asean looks to nuclear energy, public education efforts are needed: UN nuclear watchdog chief Asia Thousands rally in downtown Kuala Lumpur calling for the resignation of PM Anwar Asia Death toll climbs as Thai-Cambodia clashes continue despite calls for ceasefire Born in Shizuoka on Dec 19, 1934, Mr Tamiya's lifelong passion for military vehicles began as a child during World War II, when he spotted a US B-29 bomber passing high overhead. 'It was the first time I had ever seen an enemy plane, a shining object at the end of a long white contrail in the cloudless blue sky, but I was fascinated by its leisurely flight in the stratosphere,' he told the Shizuoka Shimbun, his home city's newspaper, in 2001. 'It was a spine-chilling sight, but for a boy who loves models, it was also an exciting sight.' After the war, his father, Yoshio, founded a sawmill and lumberyard called Tamiya Shoji & Co. When Mr Shunsaku Tamiya joined after college in 1958, the family business was making simple wooden kits for building cars. With his father, Mr Tamiya led the company into the production of plastic models, then still a relatively new product. He visited the United States for the first time in 1966, when he struggled to sell kits. He was eventually able to 'overthrow America' in the kit business by offering superior quality. 'We showed we were serious about making good products,' he said in a 2003 interview with the Shizuoka Shimbun. The company, which was renamed Tamiya in 1984, also won customers because of the meticulous accuracy of its kits. Mr Tamiya visited military museums around the world to research archives and take pictures of tanks, warships and aircraft. At locations where photography wasn't allowed, he memorised the details, recording them in a notebook afterward. During the Cold War, he got his first up-close look at Soviet tanks at a museum in Israel, which had captured them from Arab countries during the Six-Day War. His company also built model kits of racing cars as well as radio-controlled cars. To make a miniature replica of a Porsche 911 that was perfect down to the shape and placement of the engine, he bought one of the expensive German sports cars. He did this 'not to drive it, but to use it as a reference,' Mr Tamiya wrote in a memoir. 'I brought the 911 into my garage and disassembled everything that could be disassembled.' He kept Tamiya Inc a family-owned business after taking over as president in 1984, four years before his father died. In 2008, he made himself chairman when his son-in-law took over as president. After the son-in-law died of an unspecified illness at the age of 59 in 2017, Mr Tamiya returned to serve as president and chairman. Last year, he named Mr Nobuhiro Tamiya, the husband of a granddaughter, to replace him as president, with the elder Tamiya once again staying on as chairman. The company did not release details of other surviving family members. NYTIMES

Straits Times
11 hours ago
- Straits Times
Microsoft probing whether cyber alert tipped off Chinese hackers
Find out what's new on ST website and app. Microsoft is looking into whether a leak from its early alert system led to the widespread exploitation of vulnerabilities in the SharePoint software. Microsoft is investigating whether a leak from its early alert system for cybersecurity companies allowed Chinese hackers to exploit flaws in its SharePoint service before they were patched, according to people familiar with the matter. The technology company is looking into whether the programme – designed to give cybersecurity experts a chance to fix computer systems before the revelation of new security concerns – led to the widespread exploitation of vulnerabilities in its SharePoint software globally over the past several days, the people said, asking not to be identified discussing private matters. 'As part of our standard process, we'll review this incident, find areas to improve, and apply those improvements broadly,' a Microsoft spokesperson said in a statement, adding that partner programmes are an important part of the company's security response. The Chinese embassy in Washington referred to comments made by foreign affairs ministry spokesman Guo Jiakun to media earlier this week, opposing hacking activities. 'Cybersecurity is a common challenge faced by all countries and should be addressed jointly through dialogue and cooperation,'' Mr Guo said. 'China opposes and fights hacking activities in accordance with the law. At the same time, we oppose smears and attacks against China under the excuse of cybersecurity issues.' Microsoft has attributed SharePoint breaches to state-sponsored hackers from China , and at least a dozen Chinese companies participate in the initiative, called the Microsoft Active Protections Program, or MAPP, according to Microsoft's website. Members of the 17-year-old programme must prove they are cybersecurity vendors and that they don't produce hacking tools like penetration testing software. After signing a non-disclosure agreement, they receive information about novel patches to vulnerabilities 24 hours before Microsoft releases them to the public. A subset of more highly-vetted users receive notifications of an incoming patch five days earlier, according to Microsoft's MAPP website. Mr Dustin Childs, head of threat awareness for the Zero Day Initiative at cybersecurity company Trend Micro, says Microsoft alerted members of the program about the vulnerabilities that led to the SharePoint attacks. 'These two bugs were included in the MAPP release,' says Mr Childs, whose company is a MAPP member. 'The possibility of a leak has certainly crossed our minds.' He adds that such a leak would be a dire threat to the program, 'even though I still think MAPP has a lot of value'. Victims of the attacks now total more than 400 government agencies and corporations worldwide, including the US's National Nuclear Security Administration, the division responsible for designing and maintaining the country's nuclear weapons. For at least some of the attacks, Microsoft has blamed Linen Typhoon and Violet Typhoon, groups sponsored by the Chinese government, as well as another China-based group it calls Storm-2603. In response to the allegations, the Chinese Embassy has said it opposes all forms of cyberattacks, while also objecting to 'smearing others without solid evidence'. Mr Dinh Ho Anh Khoa, a researcher who works for the Vietnamese cybersecurity firm Viettel, revealed that SharePoint had unknown vulnerabilities in May at Pwn2Own, a conference in Berlin run by Mr Childs' organisation where hackers sit on stage and search for critical security vulnerabilities in front of a live audience. After the public demonstration and celebration, Mr Khoa headed to a private room with Childs and a Microsoft representative, Mr Childs said. Mr Khoa explained the exploit in detail and handed over a full white paper. Microsoft validated the research and immediately began working on a fix. Mr Khoa won US$100,000 (S$128,160) for the work. It took Microsoft about 60 days to come up with a fix. On July 7, the day before it released a patch publicly, hackers attacked SharePoint servers, cybersecurity researchers said. It is possible that hackers found the bugs independently and began exploiting them on the same day that Microsoft shared them with MAPP members, says Mr Childs. But he adds that this would be an incredible coincidence. The other obvious possibility is that someone shared the information with the attackers. The leak of news of a pending patch would be a substantial security failure, but 'it has happened before,' says Mr Jim Walter, senior threat researcher the cyber firm SentinelOne. MAPP has been the source of alleged leaks as far back as 2012, when Microsoft accused the Hangzhou DPtech Technologies, a Chinese network security company, of disclosing information that exposed a major vulnerability in Windows. Hangzhou DPtech was removed from the MAPP group. At the time, a Microsoft representative said in a statement that it had also 'strengthened existing controls and took actions to better protect our information'. In 2021, Microsoft suspected at least two other Chinese MAPP partners of leaking information about vulnerabilities in its Exchange servers, leading to a global hacking campaign that Microsoft blamed on a Chinese espionage group called Hafnium. It was one of the company's worst breaches ever – tens of thousands of exchange servers were hacked, including at the European Banking Authority and the Norwegian Parliament. Following the 2021 incident, the company considered revising the MAPP program, Bloomberg previously reported. But it did not disclose whether any changes were ultimately made or whether any leaks were discovered. A 2021 Chinese law mandates that any company or security researcher who identifies a security vulnerability must report it within 48 hours to the government's Ministry of Industry and Information Technology, according to an Atlantic Council report. Some of the Chinese companies that remain involved in MAPP, such as Beijing CyberKunlun Technology, are also members of a Chinese government vulnerabilities programme, the China National Vulnerability Database, which is operated by the country's Ministry of State Security, according to Chinese government websites. Mr Eugenio Benincasa, a researcher at ETH Zurich's Center for Security Studies, says there is a lack of transparency about how Chinese companies balance their commitments to safeguard vulnerabilities shared by Microsoft with requirements that they share information with the Chinese government. 'We know that some of these companies collaborate with state security agencies and that the vulnerability management system is highly centralised,' says Mr Benincasa. 'This is definitely an area that warrants closer scrutiny.' BLOOMBERG