Feeds

LG execs fingered in Samsung OLED tech theft

Samsung wants its rival to come clean

High performance access to file storage

Samsung has urged its South Korean tech rival LG to ‘fess up and apologise after several of its execs were indicted on charges of orchestrating corporate espionage relating to Samsung’s OLED display technology.

Eleven people were charged on Sunday with leaking the technology from Samsung, according to Korean newswire Yonhap. Aside from the LG execs, six of the group were apparently former or current employees at Samsung Mobile.

Samsung said in a statement that it stands to lose “trillions of won” from the leak.

"Executives of LG Display, which lacks OLED technology and related human resources, took the lead in this criminal act in order to overcome their shortcomings as quickly as possible," it added.

However, in a statement sent to Yonhap, LG hit back, denying any allegations of involvement and promising to sue its Korean rival for defamation.

"LG Display's products boast excellent technology and even received a presidential award with the OLED panel for 55-inch screens," it added.

"We do not need Samsung's technology which works under a totally different display system."

LG is wise to highlight its success with the 55in OLED TV model, given that it has relatively few other OLED products on the market.

It has, however, recently been picked by the Korean government to head up a project to develop transparent, flexible OLED displays for use in locations such as bus stations, aquariums and retail stores.

OLED technology - typically lighter and thinner than traditional LCDs and requiring no backlight – is spearheading the next generation of displays, although its use is restricted mainly to smartphones at the moment.

Samsung, by contrast, has around 97 per cent of the global market sewn up.

Time will tell who is telling the truth in this story, but it’s no secret that the world of IT is riddled with corporate espionage.

In the LCD display industry, Samsung and LG were both forced to pay out hundreds of millions of pounds to settle allegations of involvement in a widespread price fixing cartel. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.