【2020年04月21日,台北訊】多媒體領導廠商訊連科技(5203.TW)宣布,旗下FaceMe® AI臉部辨識引擎獲日本NEC個人電腦公司(NEC パーソナルコンピュータ社)採用導入於LAVIE Home All-in-One個人電腦之「LAVIE 人工智慧助手」軟體,透過FaceMe®臉部辨識辨別使用電腦之家庭成員及啟動專屬之使用介面及常用軟體。
LAVIE Home All-in-One為日本NEC個人電腦公司於日本市場上市之全新系列,搭載第 10 代 Intel® Core™處理器,並預載日本NEC個人電腦公司開發之「LAVIE 人工智慧助手」軟體。透過「LAVIE 人工智慧助手」,家庭成員可註冊臉部資訊及設定常用之應用程式,於使用LAVIE Home All-in-One時,透過臉部進行登入、並啟動該成員專屬之 “ Hey LAVIE常見應用”。
「臉部辨識技術是近年來熱門技術,除了各式IoT/AIoT應用外,臉部辨識也可大幅提升消費性電子的方便性。」訊連科技黃肇雄執行長表示:「日本NEC個人電腦公司與訊連在消費性多媒體軟體有長期的合作關係。透過導入FaceMe®臉部辨識,NEC LAVIE Home All-in-one及LAVIE 人工智慧助手可提供家用用戶更方便、快速,且安全性高的臉部辨識。」
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
A new COVID-19 diagnostic kit developed by Slovak scientists is registered by Slovakia’s State Institute for Drug Control (ŠUKL). The first 100,000 tests, donated to the Slovak Republic by the ESET Foundation, are ready to be handed over to state diagnostic laboratories.
BRATISLAVA – Slovak scientists from MultiplexDX, the Biomedical Research Center of the Slovak Academy of Sciences (BMC SAS), the Comenius University Science Park in Bratislava, Lambda Life and ProScience Tech joined forces to develop and register the first Slovak-made diagnostic kit for COVID-19. The ESET Foundation supported the development and production of the kit and donated the first 100,000 tests to the government of the Slovak Republic.
On May 14, the State Institute for Drug Control (ŠUKL) approved the kit, which is called vDetect COVID-19 RT-qPCR. The first 100,000 tests will be delivered to state diagnostic laboratories. “The State Institute for Drug Control dealt with the application for registration of the test as a matter of priority, and the final decision was issued within four working days of receiving the application. With the technical dossier and validation tests meeting the necessary criteria, the registration went smoothly. This is the first registration of an IVD test by the State Institute for Drug Control that was designed, manufactured, and registered in Slovakia,” says the director of ŠUKL, PharmDr. Zuzana Baťová, PhD.
During the process of test validation, Slovak researchers from MultiplexDX came up with a way to increase the test’s sensitivity, which slightly delayed the regulatory submission. “When we performed a forensic analysis, we found that the primers used to confirm the test results according to the Charité protocol were not designed optimally. Therefore, we prepared a new version of primers that increased the sensitivity and, consequently, the accuracy of the test. Then it was necessary to repeat testing and, due to this, the original date of the test’s registration was postponed,” explains Pavol Čekan, PhD, founder of MultiplexDX. The tests underwent validation showing a 100% match with the samples already evaluated.”
Blind validation tests, performed at two independent laboratories on 92 clinical samples, showed identical results in comparison with the reference method, as well as with each other. This demonstrates the high reliability of the test directly on clinical samples,” says RNDr. Boris Klempa, DrSc., from BMC SAV.
The ESET Foundation supported the development of the tests, donating the first 100,000 tests to the state. ESET also covered the financing and coordination of activities related to the test’s production and registration.
“The development of the new diagnostic kit confirms that science in the Slovak Republic is being pursued at a high level and, at the same time, demonstrates the ability for science to bring solutions to societal problems. That’s why we have been supporting science for a long time. ESET’s involvement in the development of the coronavirus diagnostic tests has also been an interesting challenge for us because we have been detecting virtual viruses since our founding as a company,” comments Richard Marko, CEO of ESET.
Throughout the test’s development and validation, the team of RNDr. Tomáš Szemes, PhD from the Charles University Science Park in Prague, also participated: “We worked with the team on optimization and validation, and I was surprised at how quickly and smoothly the process went, including registration.” The final documentation for registration at ŠUKL was prepared by Roman Oravec from the non-profit organization CCCT SK.
The Slovak companies Lambda Life and ProScience Tech were also involved during the entire preparation of the diagnostic kit. “With the cooperation of numerous talented scientists and domestic companies, we not only received approval for the first Slovak-made PCR test for COVID-19, but also developed a top product in difficult conditions, one that will help the country when it needs it most. It was by no means an easy task, and I am happy that it succeeded in the end,” concludes Róbert Mistrík from the Slovak government’s permanent crisis team.
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
About ESET For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.
Ransomware – a term that we were already aware of a few years ago but most of us rather took it as a “not-our-problem” kind of thing. However, cybercriminals didn’t see it the same way and it was just a matter of time before that kind of extortionate vermin came to do harm in our land, too. And even though the attacks on Benešov Hospital and OKD were not among the first ones, their coverage definitely raised awareness of the topic. Then, the emergence of coronavirus has actually created new opportunities of phishing and ransomware campaigns for cybercriminals; hugely supported by the massive transition of office workers to home office.
Now that the topic of cybercriminals and the possibilities of protection against them gets more publicity, it could come in useful to refresh a few rules which may significantly minimize the risk of an attack on your infrastructure. I’m going to try to summarize them in this article without getting too technical and complex so that anybody can understand. Hopefully, successfully 🙂
Rule number 1 Don’t try to find a single solution to the whole area of cyber security – there’s nothing like a “Silver Bullet” or “Holy Grail” (i.e. a single “cover-it-all” or “save-it-all”) solution. Simply not. Just as in cars, with a lot of various features that increase the safety (the sole car construction ensures passive safety, then there are the safety belts, airbags, ABS and other electronic systems), it’s their combination that will make you more likely to survive an accident, or get away without getting injured. The same applies to cyber security – it takes various “layers” of security and their correct combination to ensure the maximum degree of protection.
Rule number 2 Use up-to-date versions of operating systems and update them regularly – those “once-in-a-blue-moon” updates leave enough space for an attacker to use unpatched flaws to penetrate your infrastructure. If, for some serious reason, you really have to use operating systems after they expire (i.e. their developer doesn’t issue updates anymore), at least reserve a separate segment in the network for such devices and take special care of them; however, it’s definitely better not to have such devices in the infrastructure at all. Don’t forget to regularly update any other software you use – as well as an out-of-date operating system this can also lead to the infection of your infrastructure.
Rule number 3 Use good-quality antivirus solution. Current antivirus software includes a lot of security mechanisms and their scope is rather vast so they will help you prevent plenty of problems. Nevertheless, the same rule as with operating systems applies here – update, update, update!
Rule number 4 Don’t trust the “experts” who claim that it’s enough to use common sense, not to open suspicious attachments and to behave sensibly “on the web” to prevent the infection – that’s not true anymore. Modern malware can exploit unpatched flaws not only in operating systems, but also in applications, etc., and it can use them to get into your infrastructure without you performing an action knowingly (such as opening an email attachment).
Rule number 5 Even your firewall and network elements deserve your attention and regular updates. After all, firewall or routers are also computers, i.e. hardware, which run some specialized software. And as it’s generally known and the experience has confirmed that there’s a flaw in every kind of software, it’s vital to update such devices regularly, too. If you don’t do so, you open yet another route into your infrastructure for attackers, just as we showed in practice at our conference GREYCORTEX DAY, where we demonstrated an attack on a typical network infrastructure live.
Rule number 6 Unless necessary, don’t work within the administrator account. It’s not really needed for regular work and if an attacker breaks through the security of the device you’re logged on as an admin (most probably unnecessarily), you’ll make their efforts much easier as well as their way to your data (and possibly money).
Rule number 7 If you use any kind of remote desktop at work, don’t leave it on, nor permanently open to the Internet, as it’s often the target of initial stages of an attack and you practically leave the door to your infrastructure open. In general, be careful how your colleagues or suppliers working remotely connect and which permissions they have, which parts of the infrastructure they can access and how their connection to internal tools is secured. All this is linked to the following rule:
Rule number 8 Use VPN only (Virtual Private Network) for external connection to the internal network. If you allow direct connection from the outside without using VPN, sooner or later, some attacker will abuse it. Don’t forget to cancel disused VPN accounts as there’s always the danger of abuse of a long-forgotten access. This applies in general – if you grant anyone access to anywhere and they don’t need it for work anymore, cancel it.
Rule number 9 Divide the visitor (i.e. publicly accessible) and internal / production parts of infrastructure thoroughly and consistently. This doesn’t only apply on guest Wi-Fi, but any part of the infrastructure which can be freely accessed by unknown persons. A lot of attacks on internal infrastructure start by a “visit” of an unwelcome guest from the publicly accessible part of the network.
Rule number 10 Cybercriminals keep improving and coming up with new ways how to convey harmful code to you and your colleagues, so it’s useful to get informed regularly on new ways how someone might try to trick you (or make you do something that will spread the infection) and on new dangers. It’s definitely not a waste of time or money to take part in an interesting conference on such a topic or get regular training from companies that focus on prevention. You’d have to invest a lot more time and money in removing the consequences of actions of unknowing employees. Unfortunately, the human factor will always be the weakest link in the chain of cyber security, so it pays to regularly raise awareness of what may happen.
Rule number 11 If your colleagues work within your infrastructure on their own devices (so called BYOD, Bring Your Own Device), it’s necessary to count on the fact that you’ll have to apply all the mentioned rules on such devices, which is rather a big problem. One of the possible solutions is granting these devices access only to a certain segment of the infrastructure, secure it properly and monitor, which may obviously be quite strenuous.
Rule number 12 If I don’t understand something, I can’t deal with it. If you don’t have sufficient insight into the whole infrastructure and you don’t have the possibility to monitor what’s going on in it, the attacker is invisible to you and you’re practically blind (until the attack shows in its full extent, i.e. in case of ransomware data encryption). That’s why it’s convenient to use the NTA solution (Network Traffic Analysis), such as our solution GREYCORTEX MENDEL. These tools will not only allow you to see (to the tiniest detail) which devices there are in your network and what’s going on in them, but they will also enable you to get timely notifications in case there’s a suspicious and dishonest activity in the infrastructure thanks to the automatic analysis of the entire network performance and running event correlation (if you’re interested in more information, you’ll find it here). Obviously, it’s necessary to process such notifications and secure a remedy to the flaws found, but that’s well beyond this article. If there isn’t an internal department dealing with cyber security, you can get the SOC services (Security Operations Centre) at some of our partners and leave this burden with them. You’ll appreciate the NTA solution especially in case the attacker manages to disable your antivirus solution or to get through your firewall (e.g. by hiding illegitimate, harmful traffic inside the legitimate traffic and thus trick the firewall), as they can’t hide the signs of harmful behaviour from permanent analysis of network traffic. What’s more – the NTA solution will help you with forensic analysis, i.e. subsequent investigation, of where the attack came from or how the infection got inside your infrastructure, which will help you detect and remove weak spots in security.
IN SHORT – WHAT ARE THE MAIN BENEFITS OF OUR NTA PRODUCT GREYCORTEX MENDEL IN YOUR FIGHT WITH CYBER CRIMINALS?
It’s fully passive and it analyses the mirror of all your network traffic – it can basically monitor everything but at the same time it’s invisible to cybercriminals, they don’t know that you know about them and their activities.
It doesn’t send any data “home” for analysis (manual analysis by an army of analysts), but analyses everything using machine learning and other advanced methods.
Unlike us, people, it works 24/7/365 (plus one extra day in leap years) and it never gets tired.
Rule number 13 Back up, back up and back up again! Ideally, make backups on exchangeable media and take them physically away from your company’s premises (you’ll ensure continuity of work in case of fire, flood or mobilisation by doing so :), but mainly, you’ll make sure that in case of ransomware attack the backups in the same infrastructure won’t be encrypted. If, for some reason, it’s not possible or convenient to take away backups physically, make sure the servers with back-up copies aren’t connected to your infrastructure permanently and thus inaccessible to the attackers in time of an ongoing attack – otherwise they’ll encrypt even these backups and there won’t be anywhere to recover the data from.
And finally, the last rule: Even following all the above-mentioned rules may not ensure 100 % protection against an attack of your infrastructure as present cybercriminals are no “greasy teenagers” who want to prove themselves anymore, but professional groups with huge budgets and possibilities.
But if you stick to all of the above-mentioned, you’ll at least make their attempt to launch an attack immensely difficult, and because they know that the effort must be smaller than the possible profit (for their “business” to make sense), it’s highly probable they’ll attack somebody else instead, someone who’s an easier target not having followed the rules.
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
About GREYCORTEX GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.
MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.
MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
MAGIX Software GmbH Unveils New Strategy to Democratize Audio and Video Creation, Announces Key Organizational Changes and Appoints Jeffrey Krebs as Chief Product Officer.
05/10/23 MAGIX Software GmbH, a leading provider of audio and video software solutions, announces their new strategy and vision: Democratize audio and video creation by enabling content creators and knowledge workers with intuitive, assisted and collaborative workflows. The company aims to streamline the creative process as a whole, allowing users of any skill level to focus on creativity and produce better and faster results.Executing on this new strategy, MAGIX consolidates its product portfolio and reorganizes the company with immediate effect. Shifting from a product-based towards a capability-based organization enables a culture of efficiency, innovation and collaboration, with the goal of bringing cutting-edge solutions to the market faster. This will maximize cross-product synergies and focus investments on delivering maximum value to users of Vegas, Sequoia/Samplitude, Music Maker and MAGIX content.
Key Organizational Changes with Jeffrey Krebs as Chief Product Officer
To spearhead this shift in product strategy, MAGIX is pleased to announce the appointment of Jeffrey Krebs as Chief Product Officer (CPO) across all products, with the product leadership team reporting directly to him. Jeffrey brings a wealth of experience in the technology industry, having held leadership roles at several global tech companies, including Avid Technology, Eyeon Software, and Blackbird. Throughout his career, he has been instrumental in driving product innovation, growth, and customer success.
Jeffrey comments on his new role, “I am thrilled to be joining MAGIX and working with the development teams on its world-class video editing environment, Vegas Pro, and professional audio editing and mastering solution, Sequoia/Samplitude and the #1 downloaded DAW Music Maker. The company’s dedication to innovation and customer-centric approach aligns with my vision for the future of digital content. I am eager to contribute to the mission of democratizing audio and video creation, and I look forward to delivering cutting-edge solutions that empower creative minds around the world.”
“We are excited to welcome Jeffrey to the MAGIX family and are confident that his leadership and vision will help us deliver on our ambitious goals.” says Denis Burger, CEO of MAGIX Software GmbH.
“Our new strategy and vision will empower all users to unlock their full creative potential and to achieve high quality audio and video editing fast and easily. With Jeffrey’s guidance, we look forward to accelerating our product innovation and driving customer success across the globe.”
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
About VEGAS Today, millions of VEGAS Pro and VEGAS Movie Studio users benefit from global industry-leading video editing technologies. Now, VEGAS launches into a new era. In May, 2016, MAGIX acquired the multiple award-winning VEGAS Pro and VEGAS Movie Studio product lines, along with other video and audio products. VEGAS Creative Software stands poised to take video editing to a new level. Our development teams in the US and Germany are working on innovative solutions to old problems, and building tools that push the boundaries of what’s currently possible. The VEGAS Creative Software mission: to make VEGAS software faster, more efficient, and even more intuitive. Our goal: to provide users at all levels–from video editing amateurs to creative professionals–tools that are perfectly suited to their needs and demands.