Skip to content

訊連科技U會議推出6.1版更新 優化視訊會議、線上教學的主持人權限、桌面分享及分組討論功能

20200723日,台北訊】多媒體創作軟體及AI人工智慧領導廠商訊連科技(5203.TW)宣布推出「U會議」及「U簡報」之6.1版更新。於此版更新中,U會議優化了視訊會議中桌面分享的體驗,可於桌面分享時顯示四名與會者畫面,增加會議互動。此外,亦提供多項與會議主持人、共同主持人相關的全新功能。

因應後疫情時代的線上教學及視訊會議時的遠距簡報需求需求,「U會議」(Windows/Mac/Chrome)使用者在「桌面共享」的模式時,可同時瀏覽4個與會者的視訊畫面,提供更佳的互動性。此外,「U會議」持續強化「會議主持人」功能,會議主持人可指定其他與會者擔任會議共同主持人,進行開啟分組討論、或停止他人之桌面分享等控制權限,便於全面掌握會議。U會議也進一步強化分組討論功能,可針對分組討論室命名,方便其他與會者或學員識別。此外,此版更新也加強雜訊處理、提升視訊會議的影音品質,提供所有學校與企業使用者,高品質影音且完善管理工具的線上教學平台。

「U簡報」專為企業直播或遠端教學打造,直播時遠端觀眾可透過文字聊天室,或語音Q&A和講師詢問互動。6.1版本更新功能,若學員於課程中途加入線上直播,仍可閱覽加入時間前之文字聊天室內容,不遺漏重要討論訊息。

「訊連科技推出『U會議』與『U簡報』,專為學校與企業之視訊會議、遠距教學及線上直播打造之雲端溝通平台,可廣泛應用在校園與企業等場域。」訊連科技黃肇雄執行長表示:「後疫情時代來臨,遠距教學與直播互動轉為剛性需求。訊連科技針對反饋,持續開發新功能進行優化,帶領企業與教育單位,共同迎向疫後數位轉型的新浪潮。」

用戶可於即日起至U官方網站下載最新「U會議」與「U簡報」6.1版,或透過程式內建的升級功能取得6.1版更新,體驗最新功能。

U會議6.1版新增功能

  • 會議主持人可指定他人擔任共同會議主持人,或停止他人之桌面分享。
  • 建立分組討論時,會議主持人可為分組討論室命名,方便與會者識別。
  • Windows/Mac/Chrome使用者在U會議「桌面共享」的模式下,可同時瀏覽4位與會者的視訊畫面。
  • 全面強化雜訊處理功能,提升視訊會議之影音品質。

 

U簡報6.1版新增功能

  • 若您於課程中途加入線上直播,仍可閱覽加入時間前之文字聊天室內容,不怕遺漏重要討論訊息。

 

U會議產品資訊

訊連科技「U會議」,即日起可於U官方網站下載,並內建繁體中文、簡體中文、英文、法文、德文、義大利文、西班牙文、日文及韓文等九國語系。

您可根據與會人數及直播時間需求,選擇不同的 U 會議訂閱方案。即日起至7月31日止,免費版本最多可支援25名與會者及60分鐘會議長度。

關於訊連科技U整合通訊服務

訊連科技「U 簡報」、「U 會議」及「U 通訊」整合了遠距直播、視訊會議及即時通訊等功能,為企業及教育機構打造即時、跨國界、跨平台、行動優先、高影音品質之新世代視訊溝通服務。更多資訊,請洽:https://u.cyberlink.com/

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

Trojanized Mac cryptocurrency app collects wallets and screenshots, ESET Research discovers

BRATISLAVA, MONTREAL – ESET researchers have recently discovered websites distributing trojanized cryptocurrency trading applications for Mac computers. These were legitimate apps wrapped with GMERA malware, whose operators used them to steal information, such as browser cookies, cryptocurrency wallets and screen captures. In this campaign, the legitimate Kattana trading application was rebranded – including setting up copycat websites – and the malware was bundled into its installer. ESET researchers saw four names used for the trojanized app in this campaign: Cointrazer, Cupatrade, Licatrade and Trezarus.

“As in previous campaigns, the malware reports to a Command & Control server over HTTP and connects remote terminal sessions to another C&C server using a hardcoded IP address,” says ESET researcher Marc-Etienne M.Léveillé, who led the investigation into GMERA.

ESET researchers have not yet been able to find exactly where these trojanized applications are promoted. However, in March 2020, the legitimate Kattana site posted a warning suggesting that victims are approached individually to lure them to download a trojanized app, thus pointing to social engineering. Copycat websites are set up to make the bogus application download look legitimate. The download button on the bogus sites is a link to a ZIP archive containing the trojanized application bundle.

In addition to the analysis of the malware code, ESET researchers have also set up honeypots (research computers) and lured GMERA malware operators to remotely control the honeypots. The researchers’ aim was to reveal the motivations behind this group of criminals. “Based on the activity we have witnessed, we can confirm that the attackers have been collecting browser information, such as cookies and browsing history, cryptocurrency wallets and screen captures,” concludes M.Léveillé.

For more technical details on the latest GMERA malicious campaign, read the full blogpost, “Mac cryptocurrency trading application rebranded, bundled with malware,” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Portnox Partners with Distology for Sole Distribution of Cloud-Delivered Network Access Control (NAC) Solution in United Kingdom & Ireland

Partnership Will Drive Increased Adoption of Portnox’s Cutting-Edge NAC Solution Purpose-Built for Large Distributed Organizations in the Region

LONDON — Portnox, which supplies network access control (NAC), visibility and device risk management to organizations of all sizes, today announced that it has partnered with Distology for the sole distribution and resell of its cloud-delivered NAC-as-a-Service solution in the United Kingdom and Ireland.

We chose to partner with Distology because of their successful history of IT security solution distribution in the UK and Irish markets, said Portnox CEO, Ofer Amitai. Were confident this collaboration will yield tremendous growth for both parties, as Portnox has a unique value proposition and Distology has the market enablement expertise to effectively evangelize our network security offering.

We have a long-established relationship with Portnox and it speaks volumes that the team have decided to choose Distology as their sole UK&I distributor. The technology Portnox brings to the market is incredibly exciting and complements our existing vendor stack effortlessly, said Stephen Rowlands, Head of Sales for Distology. Were especially looking forward to representing and promoting Portnox Clear to our growing partner base, as this brand-new cloud-based technology has potential to completely disrupt the market and we foresee masses of growth potential in this innovative product.

Portnox introduced its cloud-delivered NAC-as-a-Service solution to the UK & Irish markets less than two years go. As the first to bring NAC to the cloud, Portnox has quickly gained a foothold in the region, particularly among large distributed enterprises in the retail, construction and utilities industries.

The adoption of our NAC-as-a-Service product in the UK has been very strong to date, said VP of Products, Tomer Shemer. This is a testament to the fact that the UK is one of the markets leading the trend of cloud security adoption. We expect to see continued growth in the coming years in this area of Europe.

Portnox is set to exhibit at this week’s RSA 2020 Conference (booth #4234) in San Francisco, February 24-28. Additionally, Portnox (booth #G108) and Distology (booth #C40) will both be exhibiting at InfoSec Europe 2020, Europes largest event for information and cyber security, in London, June 2-4.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Distology
Distology is a Market Enabler and offers true value for the distribution of disruptive IT Security solutions. The vendors we work with represent innovative and exciting technology that continues to excite and inspire their reseller network. Our ethos is based on trust, relationships, energy and drive and offers end to end support in the full sales cycle providing vendor quality technical and commercial resource.

ESET discovers a chat app spying on users and leaking stolen data

BRATISLAVA – ESET researchers have discovered a new operation within a long-running cyber-espionage campaign in the Middle East, apparently with links to the threat actor group known as Gaza Hackers, or Molerats.

Instrumental in the operation is an Android app, Welcome Chat, which serves as spyware while also delivering the promised chatting functionality. The malicious website promoting and distributing the app claims to offer a secure chat platform that is available on the Google Play store. Both those claims are false; the claim of being “secure” couldn’t be further from the truth, according to ESET researchers.“

In addition to Welcome Chat being an espionage tool, its operators left the data harvested from their victims freely available on the internet. And the app was never available on the official Android app store,” says Lukáš Štefanko, the ESET researcher who conducted the analysis of Welcome Chat.

The Welcome Chat app behaves like any chat app downloaded from outside Google Play: it needs the setting “Allow installing apps from unknown sources” to be activated. After installation, it requests permission to send and view SMS messages, access files, and record audio, as well as requesting access contacts and device location. Immediately after receiving the permissions, Welcome Chat starts receiving commands from its Command and Control (C&C) server, and it uploads any harvested information. Besides chat messages, the app steals information such as sent and received SMS messages, history of calls, contact list, photos, phone call recordings and GPS location of the device.“

Unfortunately for the victims, the Welcome Chat app, including its infrastructure, was not built with security in mind. Transmitted data is not encrypted, and because of that, not only is it freely accessible to the attacker, but also to anyone on the same network,” comments Štefanko.

ESET researchers tried to establish whether Welcome Chat is an attacker-trojanized version of a clean app, or a malicious app developed from scratch. “We did our best to discover a clean version of this app, to make its developer aware of the vulnerability. But our best guess is that no such app exists. Naturally, we made no effort to reach out to the malicious actors behind the espionage operation,” explains Štefanko.

The Welcome Chat espionage app belongs to the very same Android malware family and shares infrastructure with a previously documented espionage campaign named BadPatch, which also targeted the Middle East. BadPatch has been attributed to the Gaza Hackers, aka Molerats, threat actor group. Based on this, we believe that this cyber-espionage campaign comes from the same threat actors.

While the Welcome Chat-based espionage operation seems to be narrowly targeted, ESET strongly discourages users from installing apps from outside the official Google Play store – unless it’s a trusted source, such as the website of an established security vendor or some reputable financial institution. On top of that, users should pay attention to what permissions their apps require and be suspicious of any apps that require permissions beyond their functionality – and, as a very basic security measure, users should run a reputable security app on their mobile devices.

For more details about Welcome Chat spyware, read the full blog post “Secure chat platform? Nothing could be further from the truth for Welcome Chat” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

攻防的不對稱,防守難顧全

為什麼攻防難對稱 ? 攻擊者具備的優勢

實體戰場通常易守難攻,考慮後勤補給問題,有武器攻擊密度問題,有地形障礙,場地空間容量限制等。虛擬世界的戰場剛好相反,幾乎沒有限制;而且攻擊者具有無限複製分身的特性,可以來自四面八方。

存在技術落差

通常攻擊方具備專業技術上的優勢,通常隱身於世界任何一個角落,有網路便可以發動攻擊。一些組織公布揭露的弱點資訊,原本的美意是讓資安人員修補系統加強防禦。但那正好是駭客的攻擊工具準備清單。 現在的普遍現象就是:弱點公佈當天就是攻擊起始日,而望穿秋水的原廠修補可能還未開始。

商業獲利模式驅動

不像實體世界,想要增兵援助得大費周章;真實的生物病毒壽命有限,而數位世界則可以無限制的複製與傳染。以往攻擊電腦系統的動機,不外乎是為了炫技、報復懲罰或者只是好玩。在比特幣發明之前,雖然也有恐嚇、詐騙、勒贖,但無法成為大規模經濟活動。比特幣發明之後,因交易幾乎無法被追蹤的特性,使利益成為主要動機驅動著駭客經濟。綜合以上變化的趨勢,跟以往電腦犯罪不同的是,不再需要挑選特定目標了,直接無差別攻擊。

防禦的劣勢

大家都明白防禦這些危害的重要性,但建置佈署資安防禦,會面臨到的現實問題

  • 組織經濟規模不足以支撐資安團隊。在台灣中小企業佔整體企業97.64%,在員工數本來就不高的情況下,不易組成專屬資安人員編制。
  • 人力配置不足,通常組織會優先滿足生產力人員,接下來才會考慮專業IT人員,資安人員通常是非不得已後的配置。IT或資安部門甚至還會由其他部門(如:管理部門)兼任或輪派,人員配置偏低。
  • 專業技術訓練不匹配,一般以IT管理系統訓練優先,針對資安技術、資安治理的專長訓練比例低,問題一旦發生,可能無法由內部尋求協助。
  • 求證不易舉證困難,攻擊方為了隱藏行蹤,可能會毀滅跡證。無法調查來龍去脈,將來也難於防範。
  • 環境變化快速,攻擊方時時磨練新功夫,或使用現成自動化工具,而防守方常處於被動的形勢難以跟上。
  • 資訊系統或通訊協定先天設計的缺陷,未被發現或無法修補,造成就算已知也無法補強的情況。

防守的盲點

大家都知道修補防守的重要,專家也常常提出建議,告訴我們要更新修補。但不幸的現實是,有一些議題常被忽略:

  • 雖說時時更新,但生命週期結束服務中止?不少的設備在採購的當下,作業系統可能已經EOS(End of Service),更別提在上面的應用程式。更有不少的設備,是必須在不能更新的隔離環境工作。
  • 已知的漏洞好補,如果是未知(被揭露)的,雖然大部分的資安系統,都可以十分可靠的幫你找出已知的漏洞、威脅。但最難管理的是未知的未知 (the unknown unknowns),目前卻是沒有明確的解決方案。
  • 防守難以全面覆蓋,我們使用的設備包羅萬象,有各種不同作業系統,硬體架構。不是每一種都可以找到對應的防護方案。
  • 基礎建設不足,該具備的必要防護措施不齊全。可能礙於經費、組織規模等考量,組織決策接受風險。但對比於防疫觀念,不做防護卻可能害了其他人。
  • 外包管理,不論是上下游供應商,維護服務商。不論是用他們自己的設備或使用組織提供的設備,基於管轄權問題,很難維持跟組織資安要求一致的水準。還有一個考量,該負責對外業務單位可能根本沒有資安人員,或設備並非由資安(IT)管理單位所管轄。

盤點被忽略的治理盲點  尋回防守優勢

組織可能常會依賴資安廠商或顧問的建議來進行相關系統/設備的採購。的確,工欲善其事,必先利其器;適當的系統/裝備有助於管理成效。但盤點前述被忽略的議題,多半與資安治理有關,並非光靠設備就可以解決。如果負責的資安人員缺乏經驗,或專業程度不對等,可能造成投資的浪費。盤點環境中設備,或檢視管理上的疏漏,能讓資安人員與組織高層更清楚到自身環境所缺。檢討最迫切補強的地方著手,才能讓企業找回對資安防護的主導權。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於精品科技
精品科技(FineArt Technology) 成立於1989年,由交大實驗室中,一群志同道合的學長學弟所組合而成的團隊,為一家專業的軟體研發公司。從國內第一套中文桌上排版系統開始,到投入手寫辨識領域,憑藉著程式最小、速度最快、辨識最準等優異特性,獲得許多國際大廠的合作與肯定。歷經二十個寒暑,精品科技所推出的產品,無不廣受客戶好評。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×