Skip to content

SafeDNS Renames & Regroups Several Content Categories and Introduces New Ones

SafeDNS’s changed the names of several content categories and regrouped the categories, so it is easier for our users to grasp their essence to decide which of the categories to block or allow with the web filtering service.

So, we have renamed the category containing sites with child sexual abuse images, criminally obscene adult and child sexual abuse content from a list compiled by Internet Watch Foundation/IWF (UK). Now the category is called ‘Child Sexual Abuse (IWF)’, and we have moved to a large group of categories called ‘Illegal Activity’. To the same group, we have moved two more categories – ‘German Youth Protection’ and ‘Child Sexual Abuse (Arachnid)’.

A new category, ‘Crypto-Mining’, is added to the ‘Illegal Activity’ group. The category contains sites that are known to stealthily mine cryptocurrencies.

Two more categories are renamed – the one we used to call ‘Banner Ads’ into ‘Online Ads’, and the ‘Politics’ category is now called ‘Politics, Society and Law’.

A significant change is that we now have an entirely new group of categories, called ‘Security’. In this group, we have moved the three long-existing categories you know well – ‘Virus Propagation’, ‘Phishing’, and ‘Botnets’.

In the large group of categories, called ‘General Sites’, there’s a new category, ‘Online Libraries’. Its name is pretty much self-explanatory. The category contains online library sites.

We sincerely hope the new names of the filtering categories and new way of grouping them makes it clearer what content the categories have and whether to ban them or not.

Go to the Web Filtering tab of your SafeDNS Dashboard and check the changes. You might want to block some of the new categories to improve your internet security further!

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

宏碁資訊服務(股)有限公司,導入訊連科技「U 簡報」企業直播服務 建置穩定、高品質的線上教學平台

【2019年7月5日,台北訊】多媒體創作軟體領導廠商訊連科技(5203.TW)宣布專為企業直播設計之「U 簡報」服務,獲宏碁資訊服務股份有限公司(以下簡稱宏碁資服)導入,打造宏碁資服專為企業客戶提供的線上教學平台。透過導入「U 簡報」,宏碁資服可輕鬆安排會員與客戶專屬之直播課程,提供最新的產品資訊及教學,亦可同時建立雲端隨選課程之建置,方便課後觀看。宏碁資服亦於旗下電商平台「雲棧企業軟體出租網」上架U簡報、U會議及威力導演等訊連科技產品,提供客戶更全面、多樣化的影音多媒體軟體。

宏碁資服為宏碁股份有限公司(以下簡稱宏碁)在資通訊服務領域的重要策略投資,以宏碁創立於2001年『電子化服務事業群』相關團隊及業務為主體,2012年由宏碁分割創立,提供全球華人企業最先進、尖端的資訊/通訊技術及服務為願景,期許成為企業客戶的策略成長智能夥伴。旗下的「商用軟體事業單位」是以企業客戶與政府機構為主要服務對象的營運單位,專門協助企業導入滿足不同功能及需求的各類先進軟體解決方案。為了強化及深入服務,必須時常舉辦線上與線下教學課程,提供客戶最新的產品資訊及教學。如今透過導入「U 簡報」,宏碁資服可以輕鬆打造更加完整完善線上課程,供客戶學員們透過各式裝置觀看學習更流暢。

U 簡報的各式功能皆符合宏碁資服的期許,如線上報名功能具有事前進行報名名單審核管理的功能,而直播活動過程中,穩定的連線品質,讓客戶觀眾們能以跨平台的裝置或瀏覽器加入直播,透過文字聊天室和語音與講師互動。針對雲端隨選課程,U簡報可於直播活動結束後即時上傳雲端。此外,透過獨家的「智慧索引」功能,可根據簡報頁面、桌面分享、視訊攝影機畫面等元素,自動生成索引檔,方便學員檢索課程內容,並可省去課程管理者額外的編輯、上傳、建檔時間。

「致力於提供客戶更好的軟體解決方案,一直是宏碁資服的目標。」宏碁資服商用軟體事業單位 周幸蓉 總處長表示:「導入訊連科技『U簡報』,已經成功舉辦多場線上直播活動。而透過該系統獨特的線上直播及雲端隨回看等多種形式,大幅提升宏碁資服提供給客戶的服務價值!。」

「因應數位發展多元化,學習課程提升自我技能精進,必須跨越時空限制障礙。線上教學已成為現今企業與學術界的主流模式。」訊連科技業務副總林昭宏表示:「訊連科技為企業量身打造『U 簡報』直播軟體,以提供穩定之高品質影音、多元互動方式和便利的雲端隨選功能,完整規劃課前、直播中與課後的學習流程體驗,創造主辦方與用戶雙贏的正向循環。」

宏碁資服商用軟體事業單位從2019年3月起,全面使用「U簡報」作為線上直播的軟體工具,提供給客戶學員們,更優質、平穩、易操作的線上課程!而課後影片可以回看的功能,使得學員的學習更自由跟彈性,更加提升企業客戶關係與服務品質。有鑑於訊連科技的產品獨特性,宏碁資服於「「雲棧企業軟體出租網」」上架U簡報、U會議及威力導演等產品,提供客戶更全面、多樣化的影音多媒體軟體,為客戶的數位轉型之路提供一站式的服務。

 

 

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

郵件伺服器元件Exim再傳重大漏洞

全球將近六成伺服器使用的郵件伺服器元件Exim再傳重大漏洞,此漏洞可讓駭客以最高權限執行任意指令。

Qualys的研究人員發現,開源郵件傳輸代理程式(Mail Tansfer Agent,MTA)-Exim有一個嚴重的安全漏洞,在某些情況下,它可以讓遠程攻擊者在未更新的郵件服務器上執行他們選擇的命令。

*Qualys:雲端弱點管理品牌

Exim存在編號CVE-2019-10149的遠端指令執行(Remote Command Execution,RCE)漏洞。該漏洞讓攻擊者可以execv()函數以根權限執行指令,無需引發記憶體毁損或ROP(Return-Oriented Programming),進而接管受害伺服器。

本地端攻擊者或是在特定非預設組態下的遠端攻擊者可輕鬆開採這項漏洞。遠端攻擊者則需要連續和目標伺服器保持7天連線,並以每幾分鐘 1 byte的速度傳輸進行攻擊。但研究人員提醒,有鑒於Exim程式碼的複雜性,可能出現更快的攻擊方法。

本漏洞的CVSS v3.0版被列為重大風險。受影響版本包括4.87 到4.91版的Exim。Exim管理組織也呼籲用戶應升級到最新版本4.92版。

因惡意軟體犯罪者經常利用電子郵件擴散感染,故企業郵件伺服器成為重要的第一防線。ESET Mail Security 替多個平台提供最佳的反惡意軟體與主動掃描,更快的效能、整合反垃圾郵件及占用系統資源低等特性可處理高流量郵件伺服器工作。

※ 採用屢獲殊榮的技術並多次獲得VB SPAM+ 認證,最新一期, ESET 仍是維持第一的殊榮。

For  Exchange Server- https://www.eset.hk/business/mail-security-exchange/

For  Linux / BSD / Solaris- https://www.eset.hk/business/file-security-linux/

For  IBM Domino- https://www.eset.hk/business/mail-security-domino/

For  Kerio- https://www.eset.hk/business/kerio-security/

若有任何資安需求,歡迎聯絡銷售團隊 2893 8860。

原文出處:https://www.welivesecurity.com/2019/06/07/mail-server-software-exim-critical-bug/

 

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

THE FIREWALL ISN’T A FIX-ALL

Understanding the limitations of perimeter security

Firewalls.

Everybody in IT knows what they are and nearly every company has them, some even without knowing it. They prevent unwanted communication. In most cases, it’s the first line of defense against network threats. They are effective, and are part of the list of basic requirements for any network security infrastructure.

But are firewalls enough? How about “Next Generation Firewalls”? To answer that, it is helpful to have at least a basic understanding of how firewalls work. Firewalls work like a ticket agent at the airport – you have a ticket? Great, you’re on the flight. No ticket? Go away. In technical terms, firewalls are based on rules that describe the network communication, which can, for example, allow or deny communication only from specific subnets, IP addresses, on particular ports, or no communication at all.

Firewalls haven’t stayed static, and they have become more advanced; like Next Generation Firewalls or Web Application Firewalls. Next Generation Firewalls are like a gatekeeper on steroids – not only will they not let you in if you don’t have a ticket, but will kick you out if you misbehave during the communication for which you had access. Essentially like a bouncer at a bar on New Year’s – you can come in if you have a ticket, but if you start being “fresh” with your fellow party-goers, you get tossed out. Beside basic firewall features, Next Generation Firewalls also contain Application Firewalls, which controls specific services or applications (not just IPs and ports) and Intrusion Prevention Systems, which block unwanted or malicious communication and are also referred to as IPS.

That’s a lot of walls.

Now, let’s look at whether they are as effective as they are expected to be.

Physical access

Picture a situation where an attacker tries to get into your network the easy way – through physical means. Firewalls are configured to ignore any communication that originates in the external network and is aimed at the core switch. The physical attack can include interaction with employees (more on that in our previous blog post), dumpster diving, physical access to areas, even the restricted ones, and more. In most cases, it’s enough to get into a conference room (sometimes even alone), plug your device into the network via wire and the attacker is into the network and off to the races. It’s then possible to set up a remote connection from within the network, because firewall policies for internal networks are often much less restrictive than those for external network (employees need to be able to work), allowing undisturbed access inside the network, not cut off by a firewall.

Remote access

Of course, access can be gained even without any physical access. For example, a new critical vulnerability is discovered for a popular network device provider which allows anyone to execute commands from the console on that device. Cases like this don’t happen every day, but they happen nevertheless. And when they happen, they can be catastrophic, because they are unknown to the existing network security tools or network/network security administrators. An attacker with remote shell access on such a device is then able to do anything. At that point, network is his, not yours.

While vulnerabilities like this are not as common, there are other remote attacks that are efficient, effective, and more common. In our previous blogpost we described one phishing scenario and we can build on that here. Say an attacker sends a crafted .pdf file via email to the victim. Since email communication is something that nearly every company needs, the email itself is not blocked. Maybe it’s disguised as an invoice or as a charity offer (as in the previous blog post), but once that file opens, the attacker gains full access to that computer and possibly even anything that’s available from there. You might think “but we use tools that prevent any malware in emails, we’re safe.” You might be right, but these are functionally just protection against spambots. Keep in mind that this will catch only known files – that are known to the security tool. If someone sends new malware, or specially created malware (which is usually how this attack is accomplished), then it won’t help.

 


 

BYOD

Finally, consider the example of the “personal device” – where (for example) Karen in the Accounting Department brings her phone to the office, and connects it to the network. Karen likes to watch MMA, but happens to use her mobile to stream content from sites which don’t respect authors and performance rights – what might be called a “bootleg feed” or a torrent site. As these streaming sites are notoriously rife with malware, Karen’s device is now infected – because she isn’t deploying mobile device security. When she accesses the trusted internal wifi network via her phone, she is opening up a direct pipeline for all of the malware on her phone, without having to go through the firewall.

In all of these scenarios, the firewall is ineffective, because not all of the communication comes through the firewall. This means that while a firewall is effective, it doesn’t offer 100% protection. Gaps exist, just a few of which have been included here.

But how to close the gap?

With enough time and effort, any network can be penetrated. To minimize the damage, you need to take precautions steps and close gaps left by tools like firewalls. How can you do this? To be able to identify what dangers have escaped your firewall, you need to be able to visualize every communication and every device in the network. Network Traffic Analysis (NTA) solutions monitor network traffic from communications not just through the firewall, but within the firewall as well – closing the gap on not just targeted attacks from outside, but also on BYOD, and other “safe” communications within the network. With full visibility, you know about everything that happens, right when it happens, which means you can respond to detected attacks before any serious damage happens to your organization, saving money, reputation, and your IT team’s sanity.

Identify anomalies

But what good is a mere visibility if there are countless packets every second? No one will be able to go through it all in real time – even with a team of thousands. So how to make sure that this incident gets the attention it deserves? NTA technology also helps to identify anomalous communications – devices acting strangely – on the network. Since an infected device starts to behave differently than it’s normal behavior – even in hard-to-identify ways – NTA technology; like MENDEL from GREYCORTEX, solves the problem, because it analyzes all network traffic and is able to spot these anomalous behaviors nearly immediately. It then informs the network team, allowing them to isolate infected or questionable devices from the rest of the network, preventing further damage, as well as to further investigate the incident without any risk of compromising further devices.

Having a firewall greatly improves the security of your network, but relying only on firewalls is irresponsible for many reasons – poor configuration, advanced threats or above-mentioned gaps. To be sure that nothing leaves your network without you knowing about it or having a say in it, you need bigger guns than just a firewall, even a next generation one. For significant improvement in your security, you need NTA solution to identify the hidden connected devices on the network, as well as to identify anomalous behavior that shows the hidden work of a compromised device.


About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

SafeDNS Now Supports Filtering IPv6 Sites

Two years ago, we added support for IPv6 site blocking to all of our solutions – for home, education, business, and telecom – that allow SafeDNS cloud service users to restrict access to sites using the IPv6 protocol. 

In 2021, after having received loads of requests, we’ve finally released the beta version of our IPv6 resolver that comes to pile up on all our web filtering solution features aiming at making our solutions more robust, as we are permanently fighting web-based threats. 

The beta version includes enhanced security, more flexible subnetting, a simple address assignment, and a larger address webspace to name a few features. Therefore, because cyber threats evolve every day and we always strive to strengthen our solutions, we invite you to try and test our IPv6 resolver.

In our upcoming posts, we will inform you about any updates. Meanwhile, if you have any issues with the setup, here is the link on how to install the IPv6 resolver or simply contact one of our support team members.

What IPv6 is

IPv6 is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the internet. Unlike the widely used IPv4 protocol, IPv6 has a larger addressing space as this modern-day protocol uses a 128-bit address system and is a successor to IPv4, designed to replace the latter with its 32-bit address system, which will soon run out of IPv4 addresses.

IPv6 is widely used in different industries for the interaction of M2M sensor systems. The IPv6 protocol is at the heart of IoT networks and is used, along with IPv4, on many popular websites and mail services. SafeDNS is aware of the growing popularity of IPv6 and its influence on contemporary computer networks. In anticipation of a mass transition to this more advanced protocol, we are taking steps to be fully ready for it.

 

Why supporting IPv6 is important

Despite a relatively small number of IPv6 sites existing now, the SafeDNS support for blocking both IPv4 and IPv6 sites is significant for more comprehensive protection of the company’s users against all kinds of cyber threats. Previously, the SafeDNS filtering service just skipped sites on IPv6. Starting from today, SafeDNS makes the internet safer for you – by filtering out sites using IPv6 as well as IPv4. The opportunity to block IPv6 sites is supported on all the SafeDNS plans.

First and foremost, SafeDNS support for IPv6 is likely to be in demand with internet service providers that use IPv6 on their networks (including for their internal services). However, home and corporate users of the SafeDNS service will find the new opportunity quite useful cause the number of sites on IPv6 (including dangerous ones) is increasing every year.

How to enable IPv6 site blocking with the SafeDNS service

It is simple. You do not have to do anything. IPv6 support is already available for all of the SafeDNS users on any service plan. So there’s a need to change anything in your filtering settings. From now on, the sites using IPv6 are correctly blocked according to your SafeDNS settings.

Stay tuned!

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×