Skip to content

TÜV Rheinland Launches Ocean Bound Waste Recycling Audit Scheme

Marine debris, including plastics, paper, wood, metal, and other manufactured materials, is found on beaches worldwide and at all depths of the ocean. About 60%-80% of all marine debris is composed of plastic. Besides post consumer recycling, more and more leading businesses are initiating efforts in sorting and cleaning ocean-bound waste and using recycled materials in their products, as a commitment to putting their social responsibility into practice and to distinguish themselves among customers. To provide transparency and confidence for the journey of recycle, TÜV Rheinland Hong Kong has launched Ocean Bound Waste Recycling Audit Scheme.

The challenges from the business on Ocean Bound Waste Recycling includes the definition of ocean bound waste, the traceability and good practice on the recycling process and the verification standard. TÜV Rheinland has long year post-consumer waste recycling verification experience for leading business. The audit process focus not only on the whole supply chain from collecting ocean bound waste to production of final process, but also covers recycling activities to ensure the confidence.

With the newly established recycling scheme, the clear definition of ocean bound waste will be set before each audit. So that the origin of the plastic retrieved from any body of water can be confirmed and traced. During the cleaning and production of new plastic from ocean bound waste, our audit will closely monitor the journey of the recycled plastic. This allows the recycled plastic used in the products to have its origin and authenticity verified by an independent third party.

Compared with recycling plastics waste from land, ocean-bound waste recycling is a difficult endeavor, with an even longer and more complex supply chain. Thus, how to ensure supply chain transparency and instilling confidence in the customer is a key concern for businesses engaged in Ocean Bound Waste recycling. TÜV Rheinland has been playing a key role in developing verification standards and programs for whole supply chains. Transparency and consumer confidence are ensured.


Hung Simon

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About TUV
The TÜV Rheinland is a leading provider of technical services worldwide. Since our foundation in 1872, we have been providing safe and sustainable solutions for the challenges arising from the interaction between man, the environment and technology.As an independent, neutral and professional organization, we are committed to working towards a future that can fulfil the needs of both mankind and the environment in the long term.

訊連科技、威強電、大聯大世平、英特爾攜手合作 舉辦「後疫情時代、讓AI罩顧你」線上研討會,共同打造智慧辨識新紀元

【2020年08月19日,台北訊】 全球頂尖AI臉部辨識領導廠商訊連科技 (5203.TW)宣布,與工業電腦領導廠商威強電工業電腦、半導體零組件通路商大廠大聯大世平集團及物聯網領導廠商英特爾攜手合作進軍智慧辨識領域,將於2020年8月27日共同舉辦「後疫情時代、讓AI罩顧你」線上研討會,於會中分享採用Intel® OpenVINO™及Movidius™技術打造的多樣化AI智慧辨識應用,及後疫情時代口罩偵測、身分辨識及體溫量測等多種解決方案。

訊連科技、威強電、大聯大世平、英特爾攜手合作 舉辦「後疫情時代、讓AI罩顧你」線上研討會,共同打造智慧辨識新紀元

今年隨著COVID-19疫情肆虐全球,人們防疫及健康意識抬頭,配戴口罩、量測體溫已是進出公共場所不可或缺的防疫SOP。一般體溫量測站須由專人負責,使用額溫槍或熱感攝影機進行量測,除耗費人力外,亦隱藏潛在的接觸風險。因此,借助先進的AI影像辨識技術,可讓口罩偵測、身份辨識及體溫偵測等健康量測之流程自動化,大幅減少接觸的風險。訊連科技、威強電及世平集團均為英特爾物聯網解決方案聯盟(Intel® IoT Solution Alliance)的會員,將於本活動中,介紹針對Intel®物聯網平台設計之軟、硬整合解決方案,提供用戶一站式的防疫健康偵測建置。

於本研討會中,訊連科技將介紹全新之FaceMe® Health及FaceMe® Security解決方案,可於後防疫時代提供口罩辨識、戴口罩時的臉部辨識,以及整合熱感應攝影機進行進出人員體溫量測。搭配威強電之AI嵌入式系統系列產品,如採用Intel® Core™處理器,支援 OpenVINO™邏輯推理引擎之工業電腦,及採用Intel® Movidius™ Vision Processing Unit、擁有多樣規格、小尺寸、低功耗優勢之Mustang系列加速卡,於輕量化之邊緣運算裝置上,建置身分認證、口罩偵測等智慧辨識應用。世平集團是英特爾物聯網解決方案聚合商,可提供最多樣化的英特爾物聯網解決方案,為系統整合商及各式終端用戶架起端到端應用的橋樑。

「後疫情時代、讓AI罩顧你」線上研討會

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

關於威強電
IEI威强電工業電腦 (IEI Integration Corp.) 在台灣工業電腦業界居於領先的地位,也是全球主要的工業電腦廠商之一,而近年來則逐漸轉型,致力於AI智慧及邊緣運算的領域當中,推出了具代表性的AI 系列產品,例如Mustang系列加速卡、TANK AI、HTB系列和FLEX-BX200系列等。同時,威强電持續推廣自有品牌並提供ODM客製化服務,推出了數百項產品和解決方案,包括工廠自動化、網路通訊設備、國防、建築、公共安全、智能交通、醫療器材以及相關App應用等,廣泛的使用在現今智慧城市的物聯網應用中,滿足客戶的各種需求,成為物聯網全方位系統整合供應商。

更多詳細資訊請上威強電官網:https://www.ieiworld.com/

關於大聯大世平集團物聯網解決方案聚合商
大聯大世平集團是英特爾®物聯網解決方案聚合商,可提供最多樣化的英特爾®物聯網解決方案,滿足您的多領域以及多應用業務需求,在業內屬最佳選擇。大聯大世平集團身為物聯網解決方案聚合商,面向服務亞太區與中國區的IT(Information Technology)系統整合商與OT(Operation Technology)系統整合商、軟體供應商、電信服務業者、OEM、ODM夥伴等,在此生態系統中聚合上架整體端到端(邊緣對雲端)應用,透過全面的產業視角跟廣泛的供應商觸角,提供各式行業解決方案,為系統整合商選擇合適的方案,提供更加有效的支援。另一方面,亦可協助合作夥伴建立並培養行業知識以及使用案例,推進各種智慧物聯網的應用,並支援通過生態系統的協同作業來擴展業務。大聯大世平集團能善用此生態系統,為客戶提供聚合型的、端到端、立即可部署的英特爾行業整體解決方案(MRS,Market Ready Solutions)與物聯網開發套件(RRK,RFP Ready Kits)。更多詳細資訊請上大聯大世平集團物聯網解決方案聚合商官網:https://wpig-iotsolutionaggregator.wpgholdings.com/eng/main/index

世平集團物聯網聚合商新聞聯絡人 陳碩臻
02-2877-5200#86722
Elsie.Chen@WPI-Group.com

ESET highlights leading research at Black Hat USA 2020 with KrØØk and Stantinko at center stage

BRATISLAVA – ESET, a global leader in IT security, will highlight its latest research during Black Hat USA 2020. ESET researchers Robert Lipovský, Štefan Svorenčík and Vladislav Hrčka will present this Thursday, August 6, on “KrØØk: Serious Vulnerability Affected Encryption of Billion+ Wi-Fi Devices” and “Stantinko Deobfuscation Arsenal.” Black Hat is the world’s leading information security event, which is being held completely virtually this year due to the COVID-19 crisis. After the conclusion of the event, ESET will make the findings available to the research community, media and the general public.

The presentation about KrØØk by Robert Lipovský and Štefan Svorenčík will take place on Thursday, August 6, at 12:30 – 1:10 PDT (21:30 – 22:10 CEST). The talk will disclose the most recent discoveries that more Wi-Fi chip manufacturers, specifically Qualcomm and Mediatek, have also been affected by variants of the KrØØk vulnerability.

KrØØk is a vulnerability originally discovered in Broadcom and Cypress Wi-Fi chips that allows unauthorized decryption of some WPA2-encrypted traffic. Exploiting KrØØk allows adversaries to intercept and decrypt (potentially sensitive) data, but with a significant advantage for the attackers: While they need to be in range of the Wi-Fi signal, they do not need to be authenticated and associated to the WLAN. In other words, the attackers do not need to know the Wi-Fi password.  
The KrØØk findings were first presented at the RSA Conference 2020 in February. After publication, the vulnerability was brought to the attention of many more chipset and device manufacturers. Some manufacturers have since discovered their products to be vulnerable and have deployed patches. 

The second talk will aid malware researchers and reverse engineers to analyze Stantinko, a botnet performing click fraud, ad injection, social network fraud, password stealing attacks and cryptomining. The Black Hat Arsenal format will predominantly focus on Stadeo, a set of tools we developed primarily to facilitate the analysis of Stantinko but that can also be helpful when analyzing other malware strains utilizing similar techniques, including the infamous Emotet crimeware. Stadeo will be demonstrated for the first time at Black Hat USA 2020 and subsequently published for free use. 

The demo will be provided by ESET researcher Vladislav Hrčka on Thursday, August 6, at 11:00 – 12:00 PDT (20:00 – 21:00 CEST).

For more information, visit Black Hat USA and WeLiveSecurity, where the research will be subsequently published. Make sure to follow ESET research on Twitter for the latest news from ESET Research.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

TÜV Rheinland: Cyber risks for industrial plants underestimated

TÜV Rheinland and Ponemon Institute publish worldwide study on the Cybersecurity of industrial plants / Operational Technology particularly at risk / Holistic view of industrial plant security lacks / all information at https://go.tuv.com/otsurvey-2020

Cyberattacks can threaten the industrial facilities of companies even more than their IT systems. However, a holistic view of the security of industrial plants is often lacking. This is a key finding of a recent study on security in industrial companies by TÜV Rheinland and the Ponemon Institute.

Operational Technology in the sights of the hackers

Operational Technology (OT) is the main target for cyberattacks on industrial plants. These are devices and systems that control or monitor industrial processes – such as motors, pumps or valves. “OT systems differ in function and technology from classic corporate IT. At the same time, successful cyberattacks on OT systems often cause particularly high levels of damage to the companies affected”, explains Petr Láhner, Executive Vice President of the Business Stream Industrial Service & Cybersecurity at TÜV Rheinland. “We have therefore placed the Cybersecurity of Operational Technology at the center of our study, following on from the findings of the first study on this subject in 2019”.

Measures for IT and OT systems not coordinated

For the “2020 Study on the State of Industrial Security”, the independent market research company Ponemon Institute surveyed more than 2,200 cybersecurity experts worldwide from the automotive, health and pharmaceutical, logistics and transport, mechanical engineering, oil and gas and utility sectors. The Ponemon Institute, based in Traverse City, Michigan, is dedicated to independent research on information and privacy management in companies.

The following results show how much cyberattacks endanger OT systems:

  • More than half of the respondents (57 percent) say that their companies firmly expect attacks on OT systems.
  • Almost half (48 percent) are convinced that cyber threats pose a greater risk to OT systems than to the IT environment.
  • Almost two thirds (63 percent) of those surveyed stated that security measures for IT and OT systems are not coordinated in their companies.
  • For almost half of the respondents (47 percent), cyber threats to OT systems have increased over the past year. These include attacks such as phishing, social engineering and extortion software (“ransomware”).

“From our point of view, it is crucial that companies tailor their cybersecurity measures to the specific requirements in Operational Technology. For example, some control systems may have limited cybersecurity controls in place and could subsequently be vulnerable to cyber threats. To do this, companies have to assess their OT cyber risk and invest time and money for best effect. It is alarming that in the view of the experts surveyed, there are too few financial or professional resources available for OT security. In addition, a holistic view of the security of industrial plants is often still lacking. In an increasingly networked world, industrial plants are only really secure if both their IT and OT cybersecurity is addressed”, Láhner says.

The “Study 2020 on the State of Industrial Security” is available for free download at https://go.tuv.com/otsurvey-2020.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About TUV
The TÜV Rheinland is a leading provider of technical services worldwide. Since our foundation in 1872, we have been providing safe and sustainable solutions for the challenges arising from the interaction between man, the environment and technology.As an independent, neutral and professional organization, we are committed to working towards a future that can fulfil the needs of both mankind and the environment in the long term.

ESET publishes a guide for navigating the risks from vulnerabilities in the Thunderbolt interface

BRATISLAVA – ESET has published a comprehensive overview of risks stemming from Thunderspy, a series of vulnerabilities in Thunderbolt technology, and possible protections. Via Thunderspy, an attacker can change – possibly even remove – the security measures of the Thunderbolt interface on a computer. As a result, an attacker with physical access to the target computer can steal data from it, even if full disk encryption is used and the machine is locked with a password or sleeping in low-power mode.

Thunderspy was discovered by Björn Ruytenberg, a computer security researcher, in May 2020. “While Ruytenberg’s research has received publicity because of its novel attack vector, not much has been said about how to protect against Thunderspy, or even determine whether you have been a victim,” points out Aryeh Goretsky, ESET Distinguished Researcher.

In his article “Thunderspy attacks: What they are, who’s at greatest risk and how to stay safe,” Goretsky briefly explains the technical background for Thunderspy but focuses primarily on practical methods to defend against it.

Thunderbolt-based attacks are very rare because they are, by their nature, highly targeted. “The fact a typical user will not get into an attacker’s crosshairs doesn’t mean everyone is safe. For many, following some of the admittedly draconian recommendations we describe in our article really makes sense,” comments Goretsky.

There are two types of attacks against the security that Thunderbolt relies on to maintain the integrity of a computer. The first is cloning the identities of Thunderbolt devices that are already trusted and allowed by the computer. The second is to permanently disable Thunderbolt security so that it cannot be re-enabled.

“The cloning attack is like thieves who steal a key and copy it. Afterwards, they can use the copied key repeatedly to open that lock. The second attack is a form of bricking a chip. In this case, permanently disabling Thunderbolt’s security levels and write-protecting the changes so they cannot be undone,” explains Goretsky.

Neither type of attack is done simply, since actual in-person access to the target computer is required, along with the tools to disassemble the computer, attach a logic programmer, read the firmware from the SPI flash ROM chip, disassemble and modify its instructions, and write it back to the chip. Such attacks are a type of “evil maid attack,” implying the scenario of the attacker entering a hotel room while the victim is not present to conduct the attack.

The necessity to physically tamper with the computer limits the range of potential victims to high-value targets. Some may be pursued by nation-state intelligence or law enforcement agencies, but also business executives, engineers, administrative personnel or even frontline employees may be targets of opportunity if the attacker has some commercial motive, such as industrial espionage. Under oppressive regimes, politicians, NGOs and journalists are also possible targets for advanced threats like Thunderspy.To defend against Thunderspy, just like any other hardware attacks requiring physical access to the system, it’s important to decide whether the goal of the defense is to make it evident that a physical attack occurred, or to protect against it.

Protection methods against Thunderspy attacks may be divided into separate categories. “First, prevent any unauthorized access to your computer. Second, secure all your computer’s relevant interfaces and ports, such as USB-C. Besides that, look beyond physical measures and also take steps to make your computer’s firmware and software more secure,” summarizes Goretsky.

The article “Thunderspy attacks: What they are, who’s at greatest risk and how to stay safe” contains many practical pieces of advice on improving the security against the theft of data by Thunderspy, including one that stands out as simple yet relatively powerful.

“Disable hibernation, sleep or other hybrid shutdown modes. Make the computer turn completely off when not in use – doing this can prevent attacks on the computer’s memory via Thunderspy,” recommends Goretsky.

Aside from all other security measures, users employ security software from a reputable provider that can scan the computer’s UEFI firmware, one of the locations where Thunderbolt security information is stored.

For more information, please read “Thunderspy attacks: What they are, who’s at greatest risk and how to stay safe” at WeLiveSecurity.com.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×