Skip to content

BEING “SMART” DOESN’T MAKE YOU SAFE

As you may have noticed, we have posted a lot on LinkedIn recently about new cyber attacks. The biggest link between these is that those attacks are commonly caused by not following best practices, or relying only on “legacy” security tools and/or the use of weak passwords.

Even with the use of today’s most advanced security tools, it can all fail at the weakest link of the security chain – people. According to csoonline, 56% of IT decision-makers claim that targeted phishing attacks are their top security threat. And this fear isn’t wrong. Everyone can be conned, even conmen. In many cases, it’s easier to get inside of the network if you abuse that fact. The most commonly used methods of exploiting people are phishing and blackmailing.

Phishing in its simplest form can be easily detected by regular humans. Because it’s not targeted, people on the receiving end can simply ask question “why did I get this email when it has nothing to do with me?” When it comes to more advanced phishing forms, like “whale” (going for the big target, e.g. top management or CEO) or spear phishing (targeted attacks against certain group/ individual), the attacker does the research and gets to know as much as possible about victims, which can be done with a search on the Internet or dumpster diving (think about what you throw away – are there any documents?). Once equipped with knowledge about the target, those attempts are way more effective.

Let’s examine it the security context. In this example, paraphrased from Christopher Hadnagy’s book “Social Engineering: The Art of Human Hacking,” an overconfident CEO is the target. The CEO thought that it’s not possible to hack him mainly for two reasons: he doesn’t utilize much technology in his personal life, and he thought that he was too smart to fall for phishing. Turns out he wasn’t that smart after all. In this example, the CEO expected an audit and readied himself for it. After scouring various sources of information, attackers decided to go with: the name of his favorite baseball team, favorite restaurant, and that he contributed funding to cancer research. On one Friday evening, a phone call took place. In it, the attacker approached the CEO with a plea asking about small contribution to the cancer cure research stating that here will be also a contest for contributors – winners will get two tickets to CEO’s favorite baseball team match (claiming that they know that baseball is not everyone’s cup of tea) and a voucher to one of three restaurants, including CEO’s favorite one. The CEO was willing to contribute, motivated by his desire to cure cancer and the possibility of winning tickets and a voucher, he told the attacker his email address, so they would be able to send him a .pdf file. That file contained a malicious code and CEO opened it, thus providing the attacker with access to his computer and everything in its reach.

Now that his computer has been compromised, as well as access to everything within the organization his authority (and passwords) will let him touch. So what to do? The attacker has access from his computer, so access rights to sensitive files are not an issue, nor is it an issue for the security team that the CEO is accessing files throughout the company. Is there a way to identify that the “CEO” accessing sensitive data is not actually the “real” CEO? Here’s where NTA technology can help. The next step following gaining access to the CEO’s accounts is to exfiltrate data. Network traffic analysis identifies that the computer in question is transmitting data where it shouldn’t, and/or in volumes that it shouldn’t. The computer can then be quarantined, the CEO alerted, and the attacker caught.

But while phishing may be the attack that’s on the mind of management, IT teams understand that “legacy” security tools, like sandbox, IDS, endpoint security or even a firewall, are not sufficient anymore. Let’s look at why.

Modern malware has many methods of detecting if it has infiltrated a “real” environment, or in cases of targeted attacks, if it has hit the right target. When such malware determines that it could be exposed, it lies dormant. This means that if you check everything that enters your company using a sandbox, malicious software can still enter the network if it is sufficiently advanced.

Known threats are usually detected by known patterns or hashes used by endpoint security or IDS, which makes them ineffective against new or advanced threats. Some endpoint security tools use AI to determine malicious behavior and are better equipped to fight new threats, but not every device can have endpoint security. Personal or “bring your own device (BYOD)” are a great example – like a laptop that an employee brings from home and connects to the network – or an IoT sensor where endpoint software cannot be installed. These devices are connected, but not secured by endpoint security.

Firewalls are essential to any networks security infrastructure, and stop communication that goes through them, meaning that generally they are able to protect the company for any threat that comes from the external network. But what if the attack starts after a user accidentally opens a communication link which allows the attacker to get behind the firewall and inside the network? What if the threat was brought inside the company by other means than through the Internet and then tries to spread in the internal network?

While the technology is different in each of these possible attacks, they all have one thing in common – attackers who exploit a gap in the security. The best gap fillers currently available are NTA solutions, like MENDEL from GREYCORTEX. MENDEL monitors all network traffic and analyzes changes of behavior in hosts, detects policy violations, data leaks, and much more. Not every unauthorized entry can be prevented before hit happens. Relying on legacy security tools means it can take months (some statistics reference nearly 200 days) to detect attackers as they move in the network. NTA solutions like MENDEL lower this time to between minutes and a few hours, often before actual damage happens in the network or the attacker knows they’ve gained access.

The question is not if you will get hacked. The question is when you will get hacked. And when that happens, are you ready for it and can you stop it, or will you still rely solely on best practices, as the CEO did, or on “legacy” security tools?


About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

ESET 出席警方新聞發布會 展示黑客新技術及應對方法

越來越多人習慣透過手機進行網上交易和電子支付,然而,根據警方資料,去年就有 174 宗網上帳戶被盜及 47 宗入侵系統活動案,按年激增 89% 及 27 %,損失金額達 1.46 億元。為提醒市民手機網絡安全的重要性,ESET 出席由香港警務處網絡安全及科技罪案調查科舉行的新聞發布會,除展示黑客的最新技術,還聯同警方介紹各種自我檢查和應對方法。

以往,用家只要透過官方途徑,即可避免下載到偽冒應用程式,相對可以放心使用這些金融支付工具,例如銀行 app 或 PayPal 等。ESET 高級產品及服務經理盧惠光先生於發布會上,指出有黑客把惡意軟件偽裝成電池管理工具,以「覆蓋攻擊」模式(即惡意軟件以一層透明介面,覆蓋到官方正常的金融應用程式之上)記錄和盜取用戶資料,此攻擊的可怕之處在於:1)整個過程只需 5 秒鐘;2)它繞過了雙重身份驗證(2FA);3)該金融應用程式本身是從官方途徑下載,讓市民的警覺性大大減低。

要避免成為受害者,下載應用程式時,除了要使用官方商店,還需要檢查該應用程式的下載次數和評分,留意權限問題,定期更新手機的作業系統,以及安裝可靠的防毒軟件。警方提醒市民,如發現手機出現來歷不明的應用程式、耗電量或數據量增加、裝置過熱或變慢、有異常費用或自動撥打電話等,都可能是裝置已受感染。

ESET 高級產品及服務經理盧惠光先生指出,很多用戶在安裝應用程式時都沒有留意權限問題,
例如案例中的電池管理工具,根本沒需要要求用戶授予存取聯絡人的權限。

是時候談談ESET多層防禦技術了 vol.2 
多層防禦體系的基礎:機器學習技術(二)

ESET 在機學方面的最大建樹,就是開發出名為“占卜師(Augur)”的機學引擎。該引擎運用神經網絡(比如深層學習和長短期記憶)搭配六種精選分類算法,具有強大的綜合分析能力,生成穩定,可靠的綜合檢測特徵,輔助正確識別進站樣本的特性,將其判定為無毒,有害(廣告類灰色程序)或惡意(病毒,木馬等各類威脅),不僅幫助用戶防禦病毒,木馬等全類型惡意程序,還能夠抵禦廣告插件等拖慢系統性能,存在潛在危害的不良應用軟件。

此外,將自動化群組歸類和機學算法應用於惡意樣本後,還可找出新的惡意基因及其行為模式,為病毒檢測引擎提供檢測依據。再將基因圖譜與海量白名單數據庫加以比對,去除無害對象,最大程度地避免了誤報。

ESET將占卜師機學引擎反復微調和優化,使之與基因檢測,沙盤,內存分析及行為特徵提取等其他防護技術相輔相成,保障最高的檢測率及最低的誤報率。

從圖二和圖三中可以看出,在目前全球主流防毒產品中,ESET在實現最高檢測率的前提下,
做到了最低的誤報率;同時還具備系統資源佔用低,深受全球1.1億用戶喜愛。



About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

SafeDNS Extends Its Friendly Wi-Fi Partnership

We are happy to tell you the SafeDNS partnership with Friendly Wi-Fi, which is a UK government-initiated safety certification for public wireless networks, has now been extended for another year. 

Public Wi-Fi owners apply for this certification to be able to display a Friendly Wi-Fi symbol at their venues, use the electronic sign on their Wi-Fi landing pages, sites, and marketing materials. This symbol means that a public wireless network is safe for families with kids as it meets the necessary web filtering standards.

The Friendly Wi-Fi symbol is available to any venues or locations worldwide, providing a public or guest Wi-Fi service who are committed to supporting the need for safeguarding online content. Globally, over 5.000 venues have already got a Friendly Wi-Fi certification.

Why we’ve extended this partnership

The SafeDNS entire work is devoted to safeguarding young and adult web surfers from heinous, explicit, harmful content and web-borne threats. We’d love to share our expertise and high-quality web filtering solutions with partners and clients all over the world, and this partnership is a great way to do it.

To SafeDNS corporate and home users in the UK and beyond, this partnership with Friendly Wi-Fi confirms that families and businesses that have deployed our filtering service deliver their network users top-notch protection against malicious, phishing, inappropriate sites. The tried and tested SafeDNS technology, powered by AI and machine learning, has proved its efficiency multiple times in tests and reviews by 3rd-party testers.

Friendly Wi-Fi has awarded SafeDNS filtering its Approved Product badge, which means SafeDNS web filtering and cybersecurity solutions meet the standards required to make the internet cleaner and safer.

Certify your Wi-Fi with a discount

We want to remind Wi-Fi providers and public/guest Wi-Fi owners that if you use a SafeDNS web filtering solution to secure your networks from cyber threats and unwanted content, you have an opportunity to get the Friendly Wi-Fi certification with a 10% discount. Grab your chance to let your patrons, customers, and staff know you take their online safety seriously and take steps to make their online experience more comfortable. The Friendly Wi-Fi symbol will prove that your public Wi-Fi networks are free from adult and child sexual abuse images and videos, porn, and other gross content.

The SafeDNS solutions fully meet the Friendly Wi-Fi requirements and keep your network users safe online. Use the opportunity SafeDNS provides public Wi-Fi owners to certify their networks with a nice discount. Once you receive the certification, you will be able to display the Friendly Wi-Fi symbol in your venue, confirming a safer internet is available to staff members and guests at this Wi-Fi hotspot. Visit the dedicated site page and fill in an online form to apply for the Wi-Fi certification.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

ESET is awarded first place in VB Spam Email Security Comparative Review

ESET, a global leader in cybersecurity, has been awarded a VBSpam+ certification in a recent report from Virus Bulletin, a world-renowned independent testing and certification body. 

The ESET Mail Security for Microsoft Exchange Server software has been awarded this certification in the VBSpam Email Security Comparative Review March 2019. The review analyzed 11 full email security solutions and seven blacklists to measure their performance against various streams of wanted, unwanted and malicious emails. The VBSpam certification process is a world-leading test of enterprise email security solutions, providing insight into the performance of leading spam-filtering technologies.

ESET Mail Security for Microsoft Exchange Server acquired the highest rating of SPAM+, one of only four products to achieve this. As a result, ESET secured a shared first place with competitor product FortiMail. 

In addition to testing the catch rate of spam emails, the March 2019 review saw the debut of the “phishing” subcategory of emails — pertaining to emails containing links that lead to either a fake login page or to malware downloads. ESET was the only product reviewed to not miss a single phishing email, securing a score of 100.00% on its phishing catch rate.

Commenting on the results, Jakub Debski, Chief product officer at ESET, said, “ESET’s recognition as a leader in enterprise email security is a testament to our dedication in providing businesses with the absolute best in IT security. Every business relies on email communication and, with email security growing increasingly vital to enterprise safety, we are proud to provide a reliable solution to businesses around the world.” 

 

 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

訊連科技 FaceMe® AI臉部辨識引擎獲曜比科技採用 導入客立樂POS系統 打造刷臉智慧店鋪管理系統

【2019年8月20日,台北訊】世界級AI臉部辨識技術開發商訊連科技(5203.TW)宣佈,旗下FaceMe® AI臉部辨識引擎獲曜比科技採用,導入客立樂QLiEER雲端POS系統,首創將臉部辨識技術應用於POS收銀系統之權限解鎖功能中,透過人臉解鎖可大幅提升安全性並增加使用效率。

曜比科技成立於2013年,為POS系統應用開發商,將自身定位為「智慧店鋪專家」。客立樂為曜比科技股份有限公司旗下品牌,專注開發雲端 POS 系統,致力突破傳統、打造簡潔好上手的 iPad POS 收銀系統,獲全台上千個實體店家 及大型連鎖餐飲服務採用。

「客立樂期望透過開放 API 系統串接服務,結合更多系統服務商共同打造全新應用,讓小店家也能輕鬆擁有世界級的智慧店舖應用工具。」曜比科技執行長盧俊揚表示:「透過本次串接合作,將訊連科技FaceMe® AI臉部辨識引擎導入POS收銀系統中的操作權限功能,大幅強化權限管理的解鎖速度與安全性,為實體店家帶來最佳利益和管理效率。」

客立樂POS系統首創結合訊連科技FaceMe® AI臉部辨識引擎,透過人臉辨識進行店鋪服務人員操作權限之控管。相較過去只靠密碼管控權限,會有密碼外洩之疑慮,透過導入臉部辨識,權限解鎖僅需一秒內。除了確保操作權限的安全性外,更可提升使用效率,讓店舖營運更加流暢。

「臉部辨識於智慧零售有諸多應用,可以整合安控系統進行來客分析、利用電子看板投放分眾廣告外,亦可於點餐機分析來客的點餐紀錄提供點餐建議。」訊連科技執行長黃肇雄表示:「透過與客立樂POS系統的合作,FaceMe®的智慧零售應用可延伸至服務人員權限控管,為智慧店鋪打造更流暢、快速且安全的服務流程。」

訊連科技FaceMe®AI臉部辨識引擎,擁有高達99.8%的辨識率,在全球知名NIST與MegaFace Challenge中,名列全球最精準且最快速的刷臉技術之一,更為台灣最具權威之臉部搜尋引擎。除了智慧零售應用外,FaceMe®AI臉部辨識引擎已獲超過百家國內外廠商進行評估及導入,為智慧安控、智慧金融、智慧建築等應育場景,打造更高效、安全的臉部辨識解決方案。

 

 

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×