Skip to content

後防疫時代來臨,訊連科技發表全新FaceMe® Health 打造非接觸的智慧健康量測解決方案

全球頂尖AI臉部辨識領導廠商訊連科技 (5203.TW) 發表全新智慧健康量測解決方案FaceMe® Health。FaceMe® Health可建置於各式場所之出入口,如:辦公大樓、零售店、車站等,透過AI技術,自動偵測口罩配戴狀況及量測體溫,或進行身分辨別。於偵測到未配戴口罩人士出入時,以即時訊息通知保全或相關人員,可協助各式場所打造後疫情時代的非接觸性健康偵測站。

後防疫時代來臨,配戴口罩,體溫量測仍是進出各式辦公場所、公共運輸及公共場合不可或缺的環節。一般體溫量測站須由專人負責,使用額溫槍或熱感攝影機進行量測,除耗費人力外,亦隱藏潛在的接觸風險。

訊連科技全新推出之FaceMe® Health提供了一站式的智慧健康量測解決方案,透過AI影像辨識技術,可辨別訪客是否配戴口罩,或有口鼻露出、以手摀住口鼻等不當配戴或假冒情況。更可在配戴口罩時進行身分辨識,可達95%之辨識率。FaceMe® Health亦整合了即時通訊功能,於偵測到發燒或未配戴口罩時,透過U Alerts即時通知相關人員進行應對。「訊連科技的FaceMe® Health係採用全球頂尖之FaceMe® AI臉部辨識引擎打造,可有效偵測口罩配戴狀態、量測體溫,並於戴口罩時進行準確的身分辨識。」訊連科技黃肇雄執行長表示:「透過先進的AI技術,可讓健康量測之流程自動化,並減少接觸的風險,快速打造各式公共場所的智慧健康量測站。」

FaceMe® Health可安裝於最低第八代Intel® Core i3處理器之電腦,如NUS迷你電腦等,可使用USB Webcam及FLIR C3熱感攝影機,或是特定型號、搭載熱感應攝影功能的IP攝影機,即可建置於公共場所出入口進行健康偵測,輕鬆打造非接觸性、自動化的智慧健康偵測站。 


關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

Similarities Between Stuxnet And Latest Vulnerabilities Found In Schneider Triconex SIS Controllers

 

Overview

As the NSA urges companies to secure their industrial networks, two vulnerabilities were found in Schneider Electric Triconex SIS devices. Both of the vulnerabilities reside within the Tricon Communication Module (TCM) which connects the Triconex SIS to Ethernet networks. The first vulnerability (CVE-2020-7486) is a Denial of Service attack that causes the TCM to enter a fault state, and the latter (CVE-2020-7491), a more serious one, is a legacy debug port exposed to the network, that allows attackers to get root style privileges on the TCM, and upload malicious firmware to it.

While the vulnerabilities themselves are severe, exploiting them will not directly impact the SIS operation. In case of a failure in a plant, SIS operations will work normally. 

Most SIS devices use the key switch methodology, where a physical switch controls the state of the SIS. When the SIS is operating normally, this switch should be in the ‘Run’ state. In order to harm the SIS from the TCM by uploading malicious code to it, the SIS key switch must first be physically changed to ‘Program’ or ‘Remote’.

 

Hiding Malicious Activity, As Seen In Stuxnet

Leveraging CVE-2020-7491, an attacker can write its own firmware to the TCM. Because the TCM resides between the SIS and the OT Ethernet network, malicious code installed on it TCM can be used to hide or modify activity sent or received by the SIS.

SIS HMIs are usually connected to the Ethernet network. These HMIs can be fed incorrect information from the TCM module, causing fake SIS data to be displayed in the HMI. 

Moreover, the TCM could hide the malicious code blocks from the programming software, rendering it undetected from engineers. 

Similar practices have been seen in the past in the Stuxnet campaign, hooking network code to hide malicious activity. A rootkit was installed on PCs with engineering software and a part of its operation was to hide the infected PLC code blocks from being seen in the programming software.
Moreover, Stuxnet prevented operators from noticing its set of instructions sent to peripheral devices (centrifuges, etc) by hiding those instructions from the process image output. These monitoring and HMIs devices were fed incorrect information showing that the PLCs are functioning normally, and no out of the ordinary instructions were sent to them.

 

Mitigation Recommendations

  1. There are countless vulnerabilities in industrial equipment, and more vulnerabilities are discovered every day. A safety net in the form of a passive, industrial network traffic monitoring system (such as the SCADAfence Platform), will be able to slow down all attacks, enabling you to respond, and will detect most attack vectors. Such products increase the cost of an attack, in a way that makes the attack irrelevant for most attackers. See our webinar on Efficient Industrial Cyber Security Programs for more information.
  2. Update the TCM modules using the latest firmware from Schneider Electric. Updates can be found in the official advisory – Legacy Triconex  Product Vulnerabilities
  3. Make sure SIS devices are behind a firewall and only communicating in ports they should communicate in. Both vulnerabilities were found in undocumented services communicating on non standard ports.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SCADAfence
SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world’s most complex OT networks, including Europe’s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.

Scale Computing Delivers High Availability, Increased Reliability and Ease of Use to Healthcare Organizations

INDIANAPOLIS, August 4, 2020 — Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced it is experiencing increased demand for its HC3 virtualization platform across the healthcare industry.

The healthcare industry is consumed with the need to simplify the management of IT assets and reduce the time and effort expended on maintaining the current IT environment. Paris Community Hospital, Riverwood Healthcare Center, Costa Salud Community Health, and North Valley Hospital all faced significant IT challenges. These included a need to enable virtualization without complexity, improve availability of critical workloads, improve disaster recovery, and solve single vendor support of infrastructure, all while needing to meet an affordable price point.

Paris Community Hospital, part of Horizon Health, is a 25-bed critical-access hospital located in Paris, Illinois. It is a full-service provider that includes emergency medicine, surgery, rehabilitation services, radiology, diabetes education, and more. The company’s four-person IT team turned to Scale Computing to simplify the management of its IT assets and reduce the time and effort expended on maintaining the environment. Scale Computing HC3 provided a cost-effective way to simplify its IT infrastructure and VDI management as well as improved performance. It also delivered enhanced security and control and enabled rapid deployment of virtual desktops, cutting time-to-implementation from a week to two hours.

Edgar Weeks, information services manager, Paris Community Hospital, comments: “With the previous environment, the high cost of maintenance and replacement, as well as the overhead required to go through so many devices and workstations individually, was a serious issue for a small, lean organization like us. Scale Computing delivered a solution that has addressed all the challenges we faced more cost-effectively than all other options. We can add users faster, manage connections more effectively, provide better control over user access and deliver vastly improved security.”

Riverwood Healthcare Center has been providing care to residents of Aitkin County in Northern Minnesota for more than 60 years. Riverwood IT leadership turned to Scale Computing to help virtualize their operations and fortify their disaster recovery efforts with a single vendor. The Scale Computing HC3 solution simplified the center’s efforts, working across its entire infrastructure and reducing the time the Riverwood IT team spends managing its infrastructure by nearly 25%, and with a much smaller footprint.

Mike Kongsjord, IT administrator, Riverwood Healthcare Center, stated: “HC3 reduced time in implementation, making our response to requests more efficient, thus increasing satisfaction. Overall maintenance of the device is much less than supporting physical servers.”

Costa Salud Community Health is located in Rincon, Puerto Rico. The health center’s general practitioners provide comprehensive, continuous and primary healthcare services to patients. Costa Salud Community Health was looking for a single vendor solution to support its infrastructure and improve disaster recovery, all at an affordable cost. It turned to Scale Computing’s HC3 for hypervisor licensing renewal and to support higher uptime SLAs for critical workloads. Thanks to its built-in high availability, HC3 decreased the time spent recovering from a hardware failure running a critical workload from 1-8 hours to less than 10 minutes (an 83-97% reduction in recovery time). Scale Computing’s solution also reduced the time the IT staff spends managing infrastructure by more than 75% after deployment of HC3.

Ismael Ruiz, IT vice president, Costa Salud Community Health, commented: “The Scale Computing solution was very interesting from the beginning. Employees do not need certifications to use the platform. Also, we do not have to be constantly upgrading. One opportunity we saw apart from the cost was support. No matter the time, a service engineer always helps us by phone in a short time. In our case, we evaluated a lot of products and HC3 was the best suited for our operations.”

North Valley Hospital, located in Washington state, strives to provide quality patient care and education that enhances the health and well-being of its communities. While struggling to find availability to accompany its critical workloads and enable virtualization without complexity, North Valley Hospital looked to Scale Computing. Scale Computing’s HC3 not only addressed those issues, but also improved disaster recovery. The high availability built into HC3 allowed North Valley Hospital to decrease the recovery time needed for a hardware failure running a critical workload, from 8-24 hours to less than 10 minutes (97-99% reduction in recovery time). In addition, after deploying HC3, the amount of time the IT staff spends managing infrastructure was reduced by 50-74%.

Carlos Antuna, IT manager, North Valley Hospital, commented: “HC3 reduced complexity and increased availability.”

“When it comes to IT, healthcare organizations face many of the same challenges as any other organization, including limited budgets and scalability. Healthcare organizations also face challenges related to storing, managing and protecting critical patient data and research data and keeping systems available to handle critical care,” said Jeff Ready, CEO and co-founder, Scale Computing. “Healthcare organizations of all types have been choosing HC3 hyperconverged infrastructure from Scale Computing to serve their IT infrastructure needs. HC3 offers simplicity, scalability, availability, and affordability to organizations who need to streamline operations with a reliable solution. Whether a healthcare organization is specialized in emergency services, mental health, medical imaging, research or any other aspect of care, HC3 is the smart choice.”

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

ASRC 2020 年第二季電子郵件安全觀察

2020 年第二季,全球仍然籠罩在新冠肺炎的疫情中,且疫情的嚴重及影響程度已遠超第一季。許多企業採取分梯次在家上班的模式,以確保人員的健康以及組織的正常運作。然而,工作模式的改變加重了對網路的依賴,也因為人與人彼此見不到面,各種詐騙、資安破口就容易被攻擊者所利用。

ASRC 研究中心 (Asia Spam-message Research Center) 在2020年第二季觀察到幾個值得注意的郵件安全議題:

偽造釣魚郵件相較上季增加,出現不少偽冒企業管理者發送的釣魚郵件
第二季偽造企業組織通知、收貨確認通知…等釣魚郵件明顯增長,相較於上季大約成長了 24%,並且集中在六月份。

  • 為數最多的是偽造企業管理者發送郵件帳號密碼相關問題的釣魚郵件,會在收信者點擊連結後導向釣魚頁面,這個釣魚頁面通常寄宿於被入侵的 WordPress 網站;
  • 其次為假的語音與檔案遞送通知,這些通知除了部分寄宿於被入侵的 WordPress 網站,部分則是使用免費的表單或網站生成器做為釣魚頁面,還有少量直接夾帶惡意附件檔案;
  • 最後是假的貨物運送或商業交易確認,部分寄宿於被入侵的 WordPress 網站、部分則直接將釣魚頁面的 HTML 放在附件檔內試圖避開瀏覽器對網址的警示與檢查,還有一部分則是直接夾帶以 RAR 壓縮後的惡意執行檔。

釣魚頁面通常寄宿於被入侵的 WordPress 網站

病毒郵件數量明顯增加,夾帶惡意映像檔或壓縮格式檔案居多
病毒郵件同樣集中在六月份,數量較上一季成長約 60%,以夾帶惡意 .img 檔為最大宗,佔總量 1/3 以上。這些 .img 檔中包含一個惡意 .exe 可執行檔案,在 Windows 環境下被雙擊後,會自動掛載成為一個虛擬光碟,便可讀取其中的 .exe 檔;此外,網路上也有人教學如何以 7-Zip 解出映像檔內的內容,若收到此類惡意攻擊時缺乏資安意識,而以如何開啟該類檔案的目的在網路上尋找答案,也可能因此曝險!
在第二季,比較特別的是病毒郵件較常用的壓縮檔格是分別為 .ace 與 .rar,甚至比 Windows 內建能解壓縮的.zip壓縮格式還要多。WinRAR 自 2015 年即對中國個人用戶開放免費,許多中國的 PC 安裝完成後也會安裝免費的 WinRAR 作為預設的壓縮或解壓縮的工具;但是自 CVE-2018-20250、CVE-2018-20251、CVE-2018-20252、CVE-2018-20253 被揭露以來,常見的免費或可免費試用的解壓縮軟體諸如:WinRAR、7-Zip、Peazip …等,均已不再支援 .ace 的解壓縮,.ace 的病毒附件會不會是刻意面向某些族群?值得玩味。

夾帶 .ace 壓縮檔的病毒郵件仍四處散播

來自新域名的郵件,假藉口罩販售進行詐騙
全球第二季仍在新冠肺炎的籠罩之中,許多地區對於口罩的供應還是匱乏的,第二季我們發現有許多口罩銷售的電子郵件,指向一些新註冊的域名。這些域名被註冊的時間都在半年內,甚至更短,並且在一段時間後就無法拜訪,極可能是詐騙。這類郵件較上一季成長了約3.7倍,集中在六月份。

口罩銷售的電子郵件,指向一些新註冊的域名

漏洞利用在四月達到高峰,受國家資助的 APT 族群利用疫情發動郵件攻擊
附件使用已被揭露的 Office 漏洞的電子郵件攻擊,在四月份達到高峰。
受到國家資助支持的 APT 族群,也在5月份頻繁地嘗試以電子郵件發動攻擊,且大多假藉疫情的議題寄發公告通知、口罩相關資訊,或偽冒 CDC 免費分發防護設備,要求相關人員開啟並填寫附件調查表格,藉以誘導收件者開啟惡意附件!

假防疫設備支援名義,試圖攻擊相關業者

綜整了第二季惡意郵件社交工程特徵,其中一大部分是促使人「發急」,例如:很急的訂單、要求盡快回覆或查看附檔、電子信箱有狀況將被停用、被入侵了…等。因為很急,所以後續的作為就可能脫離原有的標準作業流程,加上遠距上班的因素,再確認的工作可能因此變得難以落實,就很容易落入攻擊者的陷阱。遠距上班的期間,別忘了「急事緩辦,事緩則圓」,對於任何有疑慮的來信都應當給予最小的信任,充分再確認才能免除後續資安危機。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於中華數位科技 Softnext Technologies Corp.
創立於2000年8月。
秉持著【We Secure Your Content】的服務理念,以提供企業資訊應用管理服務及打造資訊內容安全防護為宗旨。專精於提供網路應用服務技術,根據市場需求推出多款資訊內容安全的解決方案及應用服務,能夠協助企業透過符合資安管理規範並遵循法規的方式進行資訊內容安全管理,以維護員工的生產力、提升企業經營績效。

關於 ASRC 垃圾訊息研究中心
ASRC 垃圾訊息研究中心 (Asia Spam-message Research Center),長期與中華數位科技合作,致力於全球垃圾郵件、惡意郵件、網路攻擊事件等相關研究事宜,並運用相關數據統計、調查、趨勢分析、學術研究、跨業交流、研討活動..等方式,促成產官學界共同致力於淨化網際網路之電子郵件使用環境。更多資訊請參考 www.asrc-global.com

ActiveImage Protector 2018 Linux Edition, Update 7 is released

ActiveImage Protector 2018 Linux Edition Update 7 (build no. 5.1.11.6250) has been released. Added or updated features are as follows:

The backup image file version has been updated to v[210]. No change for the image Linux LVM image file.
Now supports Red Hat Enterprise Linux 7.8 and 8.0 – 8.2.
Now supports CentOS 7.8, 8.1 and 8.2.
Release Notes
Please click here to download the updated program or download from here for free trial version.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Actiphy
Actiphy founded in 2007, focuses on developing and offering innovative backup and disaster recovery solutions for complete protection of all your systems and data. ActiveImage Protector backs up Windows, Linux machines on physical and virtual environments and restore systems and data fast for you to be up and running with minimal downtime and data loss. Today Actiphy hold 20% of the image backup market in Japan and are expanding our services in the Asia/Pacific and North American regions, as well as in Europe, the Middle East and Africa.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×