GREYCORTEX CTO ON SECURING THE HOME-OFFICE NETWORK

The emergency provisions related to COVID-19 have been active for some time and more and more companies are allowing their employees to work from home. We asked Our Chief Technology Officer Vladimír Sedláček, a seasoned administrator of ICT, corporate systems, cybersecurity, and experienced developer, about his opinion on current affairs.

The Coronavirus pandemic impact is discussed everywhere, but few people seem to realize that despite all the physical risks, digital issues still present a significant problem. How do you see the current situation, and what do you consider to be the biggest risk in terms of virtual infections, and their possible outcome for companies?

It would be naive to assume that the global crisis would lead to a drop in cyberattacks or will result in a ceasefire. On the contrary. In nature, each weakened individual becomes prey. Regardless of any previous “ceasefire declarations”, we see an increase in the number of attacks and targeted at the SARS-NCov-2 situation. Obviously, we can expect contacts from faux health inspectors and money collectors. Even my inbox has received several phishing emails offering nano-silver infused masks. In addition to attacking the weakest part of cybersecurity – the user – we also see an increase in scanning; looking for vulnerable computers and security holes in firewalls or hastily constructed VPNs and remote desktop gateways. In the end, all of this contributes to latent disclosure of company secrets, production, and patent documentation, or personal data. Infiltration by extortion malware also becomes a threat and can mean a total production halt, as seen both last year and recently in some hospitals in the Czech Republic.

What do you see as the most common errors from employers and top management regarding data exposure; and how does the risk increase with massive deployments of quarantine provisions where most employees work from home?

Right now, the risk is increased by companies laying off contractors, often those working on infrastructure, promoting rotating furloughs, and allowing their administrators to work from home. This can cause a delay in necessary security patching and increased response time. Also, ad hoc suspension of certain user accounts can leave the access ripe for unauthorized access restores later. Last, but not least, some companies have allowed their employees to work from home using their home computers. VPN has thus become a gateway for free access directly into company networks, and to internal company systems, all thanks to home devices with uncertain security postures, possibly outdated operating systems, obsolete software, or a load of games full of spyware. These systems are being used by home-bound users surfing the web with local superuser rights. It is very similar to allowing the usage of personal devices (BYOD) and letting them directly connect into internal, as opposed to guest networks. A lot of companies do not, however, tackle the situation accordingly, and have not familiarized their employees with relevant security policies. Without in-depth employee training and without respecting the basic rules of cyber hygiene, internal data can leave the control of responsible people working with it. What has not received much attention so far is the risk of company device theft in conjunction with wiping such devices clean. Partly due to the fact that the employees “stay home” and are convinced that they have good visibility over their physical environment. However, thefts will happen, and the security angle will need to be tackled. I cannot understand why so few administrators allow internal networks to stay open, and who pay attention to their internal network traffic with only commonly used tools for network monitoring. Same tools that are deployed normally are themselves a potential attack target.

 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

ESET researchers disrupt cryptomining botnet VictoryGate

BRATISLAVA, BUENOS AIRES – ESET researchers have recently discovered a previously undocumented botnet named VictoryGate. It has been active since at least May 2019, and is composed mainly of devices in Peru, where over 90% of the infected devices are located. The main activity of the botnet is mining Monero cryptocurrency. The victims include organizations in both public and private sectors, including financial institutions. Thanks to data obtained during this research and shared with the nonprofit Shadowserver Foundation, at least a portion of the botnet operation has been disrupted.

ESET researchers have been “sinkholing” several domain names that control the botnet’s actions, replacing them with machines that do not send the botnet’s slave computers the commands they expect, but simply monitor botnet activity. Based on this data and ESET telemetry, ESET estimates that at least 35,000 devices became infected with VictoryGate at one point or another during this campaign.

The only infection vector used for spreading VictoryGate is via removable devices. “The victim receives a USB drive that at some point was connected to an infected machine. It seemingly has all the files with the same names and icons that it contained before being infected. Because of this, the content will look almost identical at first glance. However, all the original files were replaced by a copy of the malware,” says ESET researcher Alan Warburton, who investigated the botnet. “When an unsuspecting user attempts to open one of these files, the script will open both the file that was intended and the malicious payload.”

Warburton also warns about the impact on victims’ machines: “There is very high resource usage by the botnet, resulting in a constant 90% to 99% CPU load. This slows down the device and can cause overheating and possible damage.”

According to ESET research, VictoryGate has made a much greater effort to avoid detection than in previous, similar campaigns observed in the Latam region. And, given the fact that the botmaster can update functionality of the payloads that are downloaded and executed on the infected devices from cryptomining to any other malicious activities at any given time, this poses a considerable risk. This is particularly true since many of the victims identified were in either the public sector or in financial institutions.

If you suspect your device may have been infected with this malware, you can use our free ESET Online Scanner to clean your machine. The first-stage module is detected by ESET security products as MSIL/VictoryGate.

The peak number of unique IP addresses connecting to the botnet command and control server per day.

For more technical details about the VictoryGate botnet, read the blogpost Following ESET’s discovery, a Monero mining botnet is disrupted on WeLiveSecurity. Make sure to follow ESET research on Twitter for the latest news from ESET Research.

 

 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

訊連科技FaceMe® AI臉部辨識引擎獲NEC採用 打造具備臉部辨識功能之All-in-One個人電腦

【2020年04月21日,台北訊】多媒體領導廠商訊連科技(5203.TW)宣布,旗下FaceMe® AI臉部辨識引擎獲日本NEC採用導入於NEC LAVIE Home All-in-One個人電腦之「LAVIE 人工智慧助手」軟體,透過FaceMe®臉部辨識辨別使用電腦之家庭成員及啟動專屬之使用介面及常用軟體。

 

 

LAVIE Home All-in-One為NEC於日本市場上市之全新系列,搭載第 10 代 Intel® Core™處理器,並預載NEC開發之「LAVIE 人工智慧助手」軟體。透過「LAVIE 人工智慧助手」,家庭成員可註冊臉部資訊及設定常用之應用程式,於使用LAVIE Home All-in-One時,透過臉部進行登入、並啟動該成員專屬之 “ Hey LAVIE常見應用”。

「臉部辨識技術是近年來熱門技術,除了各式IoT/AIoT應用外,臉部辨識也可大幅提升消費性電子的方便性。」訊連科技黃肇雄執行長表示:「 NEC個人電腦與訊連在消費性多媒體軟體有長期的合作關係。透過導入FaceMe®臉部辨識,NEC LAVIE Home All-in-one及LAVIE 人工智慧助手可提供家用用戶更方便、快速,且安全性高的臉部辨識。」

FaceMe®為專為邊緣運算(Edge Computing)打造的臉部辨識引擎,可支援Windows、Linux、Android和iOS等多種作業系統。FaceMe®AI臉部辨識引擎,擁有高達99.70%的辨識率,在全球知名NIST臉部辨識競賽中,名列全球最精準且最快速的刷臉技術之一,也是台灣於該項臉部辨識競賽中表現最佳之廠商。除了可以支援功效強大的工作站或個人電腦,亦可針對IoT/AIoT物聯網設備中的輕量、低功耗設備進行優化。彈性SDK解決方案,能建構智慧安控、智慧零售、智慧辦公室、智慧警政和智慧金融等應用。已被國內外多家知名廠商採用,發展以臉部辨識技術為核心之新一代智慧應用。

 

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

遠距教學:IPEVO 實物攝影機 x Line 設定步驟

如何於 Line 中設定 IPEVO 實物攝影機

有LINE嗎?不用額外安裝新的軟體,使用介面對許多人來說也相對熟悉,LINE視訊通話中的「分享螢幕畫面」功能,從原本只能1對1,全新升級為可支援最多200人同時進行視訊會議,接下來就跟大家介紹如何使用 IPEVO 實物攝影機搭配 LINE 分享您的螢幕。 

開始前,請先準備:

  • IPEVO 實物攝影機 
  • 電腦 
  • Line 軟體

設定步驟 

請依以下步驟於 Line 中設定 IPEVO 實物攝影機。

  1. 將 IPEVO 實物攝影機插入電腦的 USB 孔。若您使用的是 VZ-R 或 VZ-X,請記得開機。

  2. 於電腦中開啟並登入 Line 軟體。若您尚未擁有 Line 帳號,請依官網 Line 註冊新帳號 步驟完成帳號申請。

  3. 點擊軟體左下角的  …  設定圖示,並於彈出選單中點選設定。

  4. 於左欄選項中選擇來電。

  5. 在相機設定及麥克風設定中,選取 IPEVO 實物攝影機作為訊號源。

設定完成。現在您可以開始使用 Line 搭配 IPEVO 實物攝影機進行視訊會議或遠距教學了!

如何於 Line 中分享 IPEVO 實物攝影機拍攝畫面

開始前,請先準備:

  • IPEVO 實物攝影機 
  • 電腦
  • Line 軟體(5.23.0 以上版本)
  • IPEVO Visualizer 軟體

設定步驟 
請依以下步驟於 Line 中設定分享 IPEVO 實物攝影機畫面。

  1. 將 IPEVO 實物攝影機插入電腦的 USB 孔。若您使用的是 VZ-R 或 VZ-X,請記得開機。
  2. 下載 IPEVO Visualizer 軟體並安裝至電腦。開啟軟體並選擇您的 IPEVO 實物攝影機作為視訊源。

  3. 將欲拍攝之材料放置於鏡頭下,並於 Visualizer 中確認畫面。可利用相機的旋轉式鏡頭及多關節支架調整至最佳拍攝角度。

  4. 設定完成後即可登入 Line 進行視訊通話。若您尚未擁有 Line 帳號,請依官網 Line 註冊新帳號 步驟完成帳號申請。

    提醒您:啟動 Line 後,請使用電腦內建相機。請勿選取 IPEVO 攝影機作為視訊源。

  5. 點選視訊視窗左下方的分享畫面。

  6. 此時會彈出分享螢幕畫面的預覽視窗,點擊確定開始進行螢幕共享。

設定完成。現在您可以隨心所欲於會議或課堂中分享您手邊的素材了!

        

貼心提醒:某些第三方軟體外接攝影機視訊時,可能出現接收者畫面正常,但本機預覽螢幕預設為鏡射影像之情形。若欲於自身螢幕瀏覽正確影像,請於軟體中的鏡像功能進行調整。若軟體無此功能,可使用 IPEVO Visualizer 軟體輸出相機影像,再利用第三方軟體中的螢幕共享功能分享畫面即可。

 



關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於IPEVO
IPEVO源自於PChome Online硬體事業部門,2007年7月正式獨立。自2004年於台灣營運Skype網絡電信服務,使台灣成為Skype全球發展中最成功的市場。2005年起以IPEVO品牌推出一系列Skype專屬硬件產品,將Skype虛擬服務轉化為使用者實質經驗。IPEVO以簡單、實際且具有價值的經驗為產品目標,其簡潔俐落的產品風格呼應著IPEVO的核心思考與產品精神。目前已研發之產品包括:Skype有線USB話機、Skype無線話機、Skype會議系統、Skype視訊設備、Stand-alone免電腦Skype話機。

使用 IPEVO 的全新 IDOCCAM APP 將您的智慧型手機變成實物攝影機

為您介紹 IPEVO iDocCam APP ,可以將您的智慧型手機立即變成實物攝影機。您可以使用這個應用程式做為視覺溝通工具,用於增進教學、學習、合作以及更多。讓我們看看不同的使用方式。

做為獨立應用程式使用

最基本的 iDocCam 使用方式,是做為您智慧型手機上的獨立應用程式使用。利用這個應用程式,您可以透過手機的相機檢視顯示的即時影像,並調整一些影像設定,例如曝光、白平衡和對焦。

在 iDocCam 內調整影像設定

搭配 IPEVO Visualizer 軟體使用

當 iDocCam 搭配 IPEVO Visualizer 軟體使用時,可以立即將您的智慧型手機轉變成無線實物攝影機。遵循以下步驟以達成:

  1. 在您的智慧型手機上安裝 iDocCam
  2. 拿出另一個裝置,在上面安裝 IPEVO Visualizer。*
  3. 將您的智慧型手機和該裝置連線到相同的無線網路。
  4. 分別啟動 iDocCam 和 Visualizer。
  5. 在 Visualizer 內選擇您的智慧型手機做為相機來源。

*Visualizer 相容於Mac、PC、Chromebook、iOS

Android Android 手機使用者只能搭配 Mac、PC、iOS 或 Android 版本的 IPEVO Visualizer 使用 iDocCam。

這樣就搞定了!您將可以在 Visualizer 內檢視手機相機的即時影像,將您的智慧型手機立即轉變成實物攝影機,用於呈現實體或文件!如果您將裝置連接到投影機,即時影像將投影到大銀幕上。除了使用 Visualizer 控制和調整即時影像以外,您也可以利用 Visualizer 內提供的功能擷取快照、錄製影片、設定即時廣播等等。

搭配 IPEVO Visualizer 使用 iDocCam,並將您的智慧型手機轉變成無線實物攝影機

經由 AirPlay 或 HDMI/VGA 連接到外部顯示器

iPhone 使用者可以選擇在 iDocCam 內,透過 AirPlay 將手機相機的即時影像送到外部顯示器,以進行無線大銀幕投影。或者可以經由 HDMI/VGA,將 iPhone 連接到外部顯示器以進行大銀幕投影。不論哪種方式,外部顯示器都會做為投影的延伸畫面。這表示使用時,iPhone 的通知、訊息和使用者介面都不會出現在顯示器上。另外在這個模式下,您可以使用比獨立模式更多的其他多項功能,例如旋轉、濾鏡和快照。

在 iPhone 上使用 iDocCam 並透過 AirPlay 傳送到外部顯示器,將顯示器轉變成投影手機相機即時影像的延伸畫面

在 iPhone 上使用 iDocCam,並將以 HDMI/VGA 連接的外部顯示器,轉變成投影手機相機即時影像的延伸畫面

要深入了解,請觀看下列影片:

想取得 iDocCam 嗎?您可以立即從 App Store 和 Google Play Store 下載。由於我們承諾在這個前所未見的時期,為需要遠端工作的人提供資源,我們將在 2020 年 4 月 30 日之前免費提供 iDocCam 的所有免費和付費功能。



關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於IPEVO
IPEVO源自於PChome Online硬體事業部門,2007年7月正式獨立。自2004年於台灣營運Skype網絡電信服務,使台灣成為Skype全球發展中最成功的市場。2005年起以IPEVO品牌推出一系列Skype專屬硬件產品,將Skype虛擬服務轉化為使用者實質經驗。IPEVO以簡單、實際且具有價值的經驗為產品目標,其簡潔俐落的產品風格呼應著IPEVO的核心思考與產品精神。目前已研發之產品包括:Skype有線USB話機、Skype無線話機、Skype會議系統、Skype視訊設備、Stand-alone免電腦Skype話機。