Skip to content

5 ideas on how to use a Wireless Document Camera to improve your lecture

The IPEVO VZ-X , a wireless document camera, is revolutionizing how lectures are taken. The VZ-X features three connection modes, namely Wi-Fi, HDMI, and USB. You can also use it with a computer, iOS/ Android devices, or directly with a projector or TV. Now, let’s look at five ways you can use the IPEVO VZ-X to improve your lecture.
  1. Interactively in a small classroom
Say you are teaching a small classroom and you fancy showing each student’s work to the members of the class. All you need is the Wireless Document Camera, VZ-X, and a big screen. You can hold the VZ-X in your hand, walk around the class while showcasing it on the big screen. Thanks to the Wi-Fi connectivity, you won’t have to deal with wire, and with a battery life of up to 12 hours, you can have a productive and interactive class or session without interruption.

  1. For a bigger setting
When in a bigger setting, the VZ-X can also be utilized. Thanks to the Wi-Fi mode, speakers can connect their device to the VZ-X and move around freely without having to worry about cables. So, that way, speakers can have their work displayed on bigger screens in the auditorium for all to see.

  1. Online learning
You can also use the VZ-X as a webcam for video conferencing or remote learning/teaching via third-party communication software like Zoom, teams, and skype. You are not restrained by cable as you can connect the VZ-X to your device through Wi-Fi without interrupting your internet connectivity. To stay connected to your network while using VZ-X in Wi-Fi mode, see the step-by-step guide here.

  1. Connect wirelessly to your iPad and make annotations with the help of the IPEVO WHITEBOARD
With both the VZ-X and the IPEVO WHITEBOARD App, you can take learning and presentations to the next level. With IPEVO Whiteboard, you can expand your wireless freedom to the maximum. It is a software that lets you make and share annotations, pictures, objects, text, and screens even as you present them. All you have to do is connect the VZ-X via Wi-Fi to an iPad using the IPEVO Whiteboard, and then you can begin to annotate. But that is not all; you can also record both audio and video as well as take snapshots. It is also possible to display through a large audience when you present on a big screen — of course, with no wire to deal with. Features and tools that make the IPEVO Whiteboard PRO an interesting software include 20 background templates, disappearing ink, browser window, add a map, picture-in-picture, laser pointer, and many more.

  1. Pair the VZ-X with the IPEVO Visualizer
The IPEVO Visualizer lets you display, record, and modify the video feed from a computer camera. When you pair it with the VZ-X, you can begin to visualize things in a new way. You can add additional value to your lecture with features like reading aids, split-screen, picture-in-picture, slow-motion, and many more. With the reading aid feature, you have access to additional tools like the line marker, highlight strip, magnifier, and masking. The split-screen feature lets you use more than one camera in presentations for side-by-side comparisons of different materials. Picture-in-picture is another feature of the Visualizer you will find interesting. For video recording or live presentation, you can use the main window to show your presentation and the pinned overlay window to show yourself talking it through. Slow-motion recording lets you record in slow motion.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About IPEVO
IPEVO makes versatile teaching tools instead of specialized “classroom equipment”.
We go beyond the usual conventions of classroom technology—large, expensive, specialized and complex—to rethink simple and flexible solutions for interactive teaching in today’s classrooms.
IPEVO’s interactive teaching tools empower educators and teachers with radically affordable and compact technology that is simple, intuitive and flexible, so that precious time and resources can be wholly dedicated to teaching. We intend to make educational technology accessible and available to all.

ESET uncovers EmissarySoldier: LuckyMouse APT group compromised government networks and private companies (telco, media and banks) in Central Asia and the Middle East

The research featured in ESET’s industry report on government works in concert with perspectives from the European Commission, CERN and Europol presented at the ESET European Cybersecurity Day virtual conference on April 28.

BRATISLAVA – The European Union’s cybersecurity strategy, and that of all governments globally, has been challenged not only in its move to “digital by default,” but also by the COVID-19 pandemic, the mass movement to working from home, and threats such as cyberespionage, ransomware and supply-chain attacks. Above all, the most formidable challenge, and foe, shared by all governments is advanced persistent threat (APT) groups.

APT groups leveraging evolved tools
The ESET industry report on government examines the threatscape APT actors are erecting, and underlines its complex nature with an exclusive look at EmissarySoldier, a malicious campaign brought to bear by the LuckyMouse APT group using its SysUpdate toolkit to compromise machines, some of which were running the popular application Microsoft SharePoint.

This dive into LuckyMouse examines its relatively unknown SysUpdate toolkit – the first samples of which were discovered in 2018. Since then, the toolkit has seen various development stages. LuckyMouse’s current modus operandi is to install its implants via a so-called trident model that uses three components: a legitimate application vulnerable to DLL hijacking, a custom DLL that loads the payload and a raw Shikata Ga Nai-encoded binary payload.

Overview of the trident model

Since SysUpdate’s modular architecture enables its operators to limit exposure of malicious artifacts at will, ESET researchers did not retrieve any malicious modules and expect this to be an ongoing challenge in future analyses. Regardless, LuckyMouse increased its activity in 2020, seemingly going through a retooling process where various features were being incrementally integrated into SysUpdate’s toolset.

The evolution of tools leveraged by APT groups like LuckyMouse is of key concern as governments are vested with the responsibility to ensure stability for citizens, the business environment and engagement with other nation-states. These tasks of governance are under threat as LuckyMouse and other APT groups, including state actors and their collaborators, home in on widespread collaboration platforms like Microsoft SharePoint and digital by default service provision.

Government in focus
The years 2020 and 2021 have seen several ESET research collaborations come to maturity, including engagements with the likes of the European Organization for Nuclear Research (CERN, Europol, and the French National Cybersecurity Agency (ANSSI). Many of their perspectives, shared at the virtual event and in the report, stress that governments and their IT infrastructure exist as default targets.

The report highlights the need for technologists to continue supporting governments in closing security gaps and monitoring the tactics, techniques and procedures of APT groups via the various endpoint detection and response technologies at their disposal. To download the report, visit WeLiveSecurity.com and make sure to follow ESET Research on Twitter.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Pharmaceuticals Like Johnson & Johnson Are Experiencing Daily Cyber Attacks From Nation State Attackers

As each day passes, so does the increasing amount of security risks with the cybersecurity attack vector. Every organization can easily fall victim to another cyber threat, but recently, the pharmaceutical industry has become a prime target.

The increasing number of attacks on pharmaceutical organizations is due to the ongoing COVID-19 vaccine development and distribution and this has resulted in the pharmaceutical sector becoming the most attractive industry for cybercriminals. A successful vaccine has become one of the most valuable intellectual properties for cyber attackers. Beyond attacking the pharmaceutical formula, its data on testing the drug trials have become a tempting target for nation-state attackers

A recent example of pharmaceutical companies being attacked is when the Wall Street Journal reported that North Korean state attackers have targeted pharmaceutical companies in the U.S., including Johnson & Johnson. This sparked the Chief Information Security Officer at Johnson & Johnson to say in an interview that they are experiencing attacks from nation-state threat actors “every single minute of every single day.”

This tale isn’t new as in late 2010 North Korean threat actors reportedly targeted UK-based vaccine maker AstraZeneca whose vaccine was co-developed with the University of Oxford. The attack method was spear phishing via social media intending to inject malware by way of offering AstraZeneca employees fake job offers.

The attack surface of pharmaceutical organizations will only continue to grow and the need for better cybersecurity will become more of a priority as more pharma companies will fall victim which could result in disastrous consequences.

Pharma A Prime Cyber Attack Target

The pharma industry is no stranger to being targeted by attackers. Pharmaceutical companies suffer more breaches than any other industry as a result of malicious activity with an average breach resulting in a loss of over 5 million dollars according to the 2020 Cost of a Data Breach Report. Nation-state attackers are induced to target pharmaceutical firms for financial profit, which was one of the main goals for the cybercriminal group who launched the reportedly North Korean government-sponsored attacks.

Cyber espionage is now being recognized as another influential reason for state-sponsored attackers attempting to gain technological advantage for their countries’ economies. The pharmaceutical industry’s key components are based on innovation with comprehensive R&D investments, intellectual property, and patented data. Anytime any data or property is affected or exploited by an attack it can result in devastating losses which can erode patient and consumer trust.

The 2019 attack on German drug conglomerate Bayer is an example of cyber espionage by a state-sponsored attack. Bayer fell victim to a cyberattack from the Chinese threat actor group known as Wicked Panda. The attackers used the Winnti malware, which makes it possible to access a system remotely and then pursue further exploits once in the system.

Pharmaceutical Intellectual Property Attacker’s Favorite Target

Sensitive information and data are not the only attractive targets of pharma companies that hackers are looking to exploit and gain access to. Nation-state hackers have their eyes on a different prize, intellectual property. Protecting intellectual property has always been a priority for the pharmaceutical industry.

Pharmaceutical products are typically only protected by patent for seven years in the United States, and this data could help foreign generic drug manufacturers to be more ready for the expiration of the patent. For example, Chinese nation-state hackers are targeting US pharmaceutical companies to gather information and share it with Chinese companies to offer an advantage against their western competitors.

The years of research and development into developing new pharmaceuticals have attracted hackers to exploit intellectual property somewhat enticing. Recent attacks have targeted intellectual property such as information related to the development of a vaccine or other medical mitigation measures.

Another risk that many pharmaceutical companies experience is that the technology used in their manufacturing systems is much older than the internet, which results in systems being extremely insecure. They were originally designed as ‘air-gapped’, or isolated systems and not built to confront any cybersecurity attacks. For pharmaceutical companies, any size attack by an adversary can result in loss of productivity and availability of physical devices. This can lead to safety issues, reputation, financial losses, and even death.

To fight off different attacks, and the possible exploitation of vulnerabilities, organizations and more specifically enterprises need to address the need to secure the crucial intellectual property while understanding which devices and technologies are at risk. This starts with increasing awareness of nation-state attacks and adopting a more proactive approach to cybersecurity.

What Pharmaceutical Firms Can Do

Pharmaceutical firms need to allocate the right amount of attention and resources to understand what they can do to protect the company’s data and system. The first step is understanding the different risks that come with pharmaceutical manufacturers and systems and what steps are needed to ensure better security.

With the increased attention and awareness of state-sponsored attacks over the past few years, pharmaceutical companies now are understanding the importance of implementing the right security practices when it comes to securing their IT and OT systems. As pharmaceutical manufacturers move forward digitally and continue to modernize their processes with more robotics and IoT technologies, this creates new entry points for attackers to exploit and move laterally within an organization’s system and servers.

In the past, most manufacturers were using stand-alone systems, but with the advancement of technology, they are increasing their connections to the internet to allow third-party contractors and vendors to gain access to work with their equipment. This has forced the security teams at pharmaceutical companies to change their approach to securing their product.

While not every pharmaceutical company has changed its security approach, there has been a massive increase in awareness which has led to changes in the industry. Some companies, like Taro and Rafa, have taken a more proactive approach when securing their connected OT environments with a passive network monitoring solution, specifically designed for OT environments. This has allowed them to have full visibility into their network, reduce the risk of operational downtime, improve their network security and comply with demanding industry regulations.

As pharmaceutical organizations continue to be on the radar for cyberattacks, now is the time to take action and detect and mitigate any risks. Having the right approach and strategy in place with the right blend of awareness and technology, pharmaceutical organizations can now implement the right approach to securing their data, servers, and intellectual property against cyber attacks.


How SCADAfence Discovered Targeted Ransomware In A Pharmaceutical Facility

SCADAfence’s Incident Response team recently assisted a big pharmaceutical company with an industrial cybersecurity emergency. This research has been published with the goal of assist organizations to plan for such events and reduce the impact of targeted industrial ransomware in their networks.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SCADAfence
SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world’s most complex OT networks, including Europe’s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.

無線實物攝影機如何提升教學互動的5種方法

IPEVO VZ-X是一款無線實物攝影機,改變及創新上課教學的方式。VZ-X具有Wi-Fi、HDMI和USB等三種連接模式,可以投影即時影像至電腦、iOS / Android 設備,或直接與投影機或電視一起使用。

現在,讓我們來看看無線實物攝影機如何提升教學互動的5種方法。

  1. 小型教室授課提升互動性

在小型教室授課,想展示每位學生的作品給全班看時,只需要一台 VZ-X 無線實物攝影機和大螢幕便可輕鬆達到這個目的。可以手持 VZ-X 在教室間走動,輕鬆拍攝學生作品、展示投影到大螢幕上。 因為使用 Wi-Fi 傳輸影像,行動無需受線材限制,電池續航時間更長達12小時,讓課堂或會議進行時不受干擾,提高成效並享受豐富的互動過程 。

  1. 大型教室或會議環境亦適用

在大型教室、會議空間或場地時,VZ-X也很適合。透過Wi-Fi模式,講者將設備連線至VZ-X便可以自由移動,不必擔心線材的限制。講者亦可在大型講堂裡,輕鬆展示作品在更大的銀幕上,供所有人觀看。

  1. 線上學習

使用VZ-X作為網路攝影機,透過第三方通訊軟體(例如teams、skype、line和Zoom)可以進行視訊會議、遠距教學或線上學習。經由Wi-Fi將VZ-X連接到設備,不受線材的限制,並且能持續保持網路連線。

在VZ-X Wi-Fi模式下需要保持網路連線時,可參閱詳細的步驟指南

  1. VZ-X無線連接至iPad,搭配IPEVO WHITEBOARD白板軟體,可在影像上筆記、註解

使用VZ-X搭配 IPEVO WHITEBOARD App,擴展「無線」自由,授課、學習或簡報的呈現如虎添翼。這是一款可應用在簡報時,製作及分享筆記註釋、圖片、實物、文字和螢幕的軟體。

只需將VZ-X透過Wi-Fi連接到iPad並開啟 IPEVO WHITEBOARD,便能開始筆記、註釋。不僅如此,還可以錄製聲音、影像以及使用截圖功能。亦可分享至大螢幕上,讓更多觀眾觀看,當然是以無線方式,讓簡報方式更自由。

豐富的功能及工具,讓IPEVO WHITEBOARD PRO成為相當受歡迎的軟體,這些功能包含20 個背景範本、消失墨水、瀏覽視窗、新增地圖、子母畫面、雷射筆等。

  1. VZ-X搭配 IPEVO Visualizer軟體使用

IPEVO Visualizer 可提供使用者展示、錄製和編輯來自電腦攝影鏡頭的影像。電腦開啟IPEVO Visualizer並與VZ-X配對後,新的視覺化方式可讓簡報、展示更生動。例如使用閱讀輔助工具、分割螢幕、子母畫面、慢動作錄影等以及許多其他功能,增進課堂趣味。

使用閱讀輔助功能時,另有附加工具,如線條標記、螢光條、放大鏡及遮罩模式等。分割螢幕功能在簡報時可使用兩個攝影鏡頭,同時並排展示不同的文件或實物進行比較。

子母畫面是Visualizer另一個有趣的功能,影片錄製或現場直播時,使用主窗口來展示呈現,而子窗口則可以觀看講者生動解說。慢動作錄影功能則是讓使用者錄製慢動作影片,呈現不同效果。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於IPEVO
IPEVO源自於PChome Online硬體事業部門,2007年7月正式獨立。自2004年於台灣營運Skype網絡電信服務,使台灣成為Skype全球發展中最成功的市場。2005年起以IPEVO品牌推出一系列Skype專屬硬件產品,將Skype虛擬服務轉化為使用者實質經驗。IPEVO以簡單、實際且具有價值的經驗為產品目標,其簡潔俐落的產品風格呼應著IPEVO的核心思考與產品精神。目前已研發之產品包括:Skype有線USB話機、Skype無線話機、Skype會議系統、Skype視訊設備、Stand-alone免電腦Skype話機。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×