À½¼ºÆÐÅÏÀÎ½Ä ±â¼ú·Î º¸À̽ºÇÇ½Ì ¿ÏÀü Â÷´Ü

¡°¸ð¹ÙÀÏ º¸¾ÈÀÇ Á¾ÇÕÀûÀÎ ¼Ö·ç¼ÇÀ» Á¦°øÇÏ°Ú½À´Ï´Ù¡± Á¤ÀçÇå ±âÀÚl½ÂÀÎ2015.09.17l¼öÁ¤2015.09.17 16:19

Å©°Ô

ÀÛ°Ô

¸ÞÀÏ

Àμâ

½Å°í

   
 

À½¼ºÆÐÅÏÀÎ½Ä ±â¼ú·Î º¸À̽ºÇÇ½Ì ¿ÏÀü Â÷´Ü
“¸ð¹ÙÀÏ º¸¾ÈÀÇ Á¾ÇÕÀûÀÎ ¼Ö·ç¼ÇÀ» Á¦°øÇÏ°Ú½À´Ï´Ù”
¢ß¿¥½ÃÅ¥¾î È«µ¿Ã¶ ¼ÒÀå hong dong cheol

Çö´ëÀο¡°Ô ½º¸¶Æ®ÆùÀº ÀÌ¹Ì »ýÈ°ÇʼöÇ°ÀÌ µÈ Áö ¿À·¡´Ù. ƯÈ÷ ÷´Ü ±â¼úÀÇ ¹ß´Þ·Î °èÁÂÀÌü³ª Ä«µå°áÁ¦, ´ëÁß±³Åë ÀÌ¿ë µî ´Ù¾çÇÑ ¾÷¹«°¡ °¡´ÉÇØÁö¸é¼­ ½º¸¶Æ®ÆùÀº »ýÈ°ÇÏ´Â µ¥¿¡ ÇÊ¿äÇÑ ¸¹Àº µµ±¸µéÀ» ´ëüÇÏ´Â À¯¿ëÇÑ ¼ö´ÜÀ¸·Î ÀÚ¸®¸Å±èÇß´Ù. ÇÏÁö¸¸ ÀÌ¿Í µ¿½Ã¿¡ ½º¸¶Æ®Æù¿¡ ´ã±ä °¢Á¾ °³ÀÎÁ¤º¸¿¡ ´ëÇÑ º¸¾È Ãë¾à¼ºÀÌ ÁöÀûµÇ¸ç ‘¸ð¹ÙÀÏ º¸¾È’ÀÌ Áß¿äÇÑ »çȸ¹®Á¦·Î ºÎ°¢µÇ°í ÀÖ´Ù. 

ºñ¹Ð¹øÈ£ ¿ä±¸ Áö¼ÓµÇ¸é…°­Á¦ ÅëÈ­Á¾·á
‘Á¤º¸°¡ °ð µ·ÀÌ µÇ´Â ¼¼»ó’. °³Àο¡ ´ëÇÑ °ÅÀÇ ¸ðµç Á¤º¸°¡ µé¾îÀÖ´Â ½º¸¶Æ®ÆùÀº ¾ðÁ¦³ª ºÒ¹ýÀûÀÎ À̵æÀ» ³ë¸®´Â ÀÚµéÀÇ Ç¥ÀûÀÌ µÇ¾î¿Ô´Ù. ÀÌ¿¡ Á¤ºÎ´Â Åë½Å»ç Ãø¿¡ º¸¾È´ëÃ¥ ¸¶·ÃÀ» Ã˱¸ÇÏ´Â ÇÑÆí, ½º¸¶Æ®Æù »ç¿ëÀڵ鿡°Ôµµ °¢Á¾ ÁÖÀÇ»çÇ×À» ÀüÆÄÇϸç ÇÇÇعæÁö¸¦ À§ÇØ Èû½á¿Ô´Ù. ±×·¯³ª °¥¼ö·Ï ±³¹¦ÇØÁö°í ¾Ç¶öÇØÁö´Â ¼ö¹ý¿¡ ÇÇÇذǼö´Â 2013³â 4765°Ç¿¡¼­ Áö³­ÇØ 7635°Ç, ÇÇÇؾ×Àº 2100¿©¾ï ¿øÀ¸·Î Áõ°¡ÇÏ°í ÀÖ´Ù.

ÀÌ·¯ÇÑ °¡¿îµ¥ ÃÖ±Ù ¾÷°è ÃÖÃÊ À½¼ºÀνıâ¹ÝÀÇ º¸À̽ºÇÇ½Ì ¹æÁö ±â¼ú·Î ÁÖ¸ñ¹ÞÀº ¾÷ü°¡ ¹Ù·Î ¢ß¿¥½ÃÅ¥¾î´Ù. Áö³­ 7¿ù ±¸±Û Ç÷¹À̽ºÅä¾î¸¦ ÅëÇØ Ã¹ ¼±À» º¸ÀÎ ‘¼¼ÀÌÇÁº¸À̽º(SafeVoice)’´Â º¸À̽ºÇǽ̿¡ ÁÖ·Î ÀÌ¿ëµÇ´Â ´Ü¾î³ª ÆÐÅÏÀ» ºÐ¼®ÇØ º¸À̽ºÇÇ½Ì ¿©ºÎ¸¦ ÆÇ´ÜÇÑ´Ù. ‘ºñ¹Ð¹øÈ£·°øÀÎÀÎÁõ¼­·¾ÆÀ̵𷺸¾ÈÄ«µå¹øÈ£’ µîÀ» ¿ä±¸ÇÏ´Â ½ÄÀÇ º¸À̽ºÇÇ½Ì À¯µµ°¡ ¹ß»ýÇϸé À̸¦ »ç¿ëÀÚ¿¡°Ô °æ°íÇϸç, Áö¼ÓµÉ °æ¿ì ÅëÈ­¸¦ °­Á¦·Î Á¾·áÇÏ´Â ¹æ½ÄÀÌ´Ù. ¿¥½ÃÅ¥¾îÀÇ È«µ¿Ã¶ ¿¬±¸¼ÒÀåÀº “±âÁ¸ÀÇ º¸¾È ¾îÇø®ÄÉÀ̼ÇÀÇ °æ¿ì ÀüÈ­¹øÈ£³ª ¹®ÀÚ¸Þ½ÃÁö ¾ÈÀÇ Æ¯Á¤´Ü¾î, URL µîÀÇ ´ÜÆíÀûÀÎ Á¤º¸¸¸À¸·Î À¯Çؼº ¿©ºÎ¸¦ ÆÇ°¡¸§ÇØ¾ß ÇÏ´Â ÇÑ°èÁ¡À» °®°í ÀÖ¾ú½À´Ï´Ù. ÇÏÁö¸¸ À̸¦ ȸÇÇÇϱâ À§ÇÑ Æí¹ýÀÌ ¹ßÀüÇÏ¸ç ¹«ÀǹÌÇÑ ¼Ò¸ðÀüÀÌ °è¼ÓµÇ¾î ¿Ô½À´Ï´Ù. ÀúÈñ´Â ÀÌ¿¡ À½¼ºÆÐÅÏÀ» ÀνÄÇÒ ¼ö ÀÖ´Â ±â¼úÀ» Ãß°¡ÇØ º¸´Ù ´Ù°¢ÀûÀÎ ÇÇÇعæÁö ¼Ö·ç¼ÇÀ» Á¦°øÇÏ°í ÀÖ½À´Ï´Ù”¶ó°í ¼³¸íÇß´Ù. ƯÈ÷ ÆÐÅÏÀÇ °æ¿ì ±âÁ¸ º¸À̽ºÇÇ½Ì »ç·ÊµéÀ» ºÐ¼®ÇÏ´Â ÇÑÆí, °æÂûûÀÇ ÀÚ¹®À» ÅëÇØ º¸´Ù ¹æ´ëÇÑ µ¥ÀÌÅ͸¦ È®º¸ÇÏ´Â µ¥¿¡ ÁÖ·ÂÇß´Ù. 

ÀÌ·¯ÇÑ À½¼ºÆÐÅÏÀÎ½Ä ±â¼úÀº ÅëÈ­ °úÁ¤¿¡¼­ÀÇ ½É¸®ÀûÀÎ ¾Ð¹ÚÀ¸·Î ÇÇÇØÀÚ¸¦ ¾ç»êÇØ¿À´ø º¸À̽ºÇÇ½Ì ¾÷ü¿¡ ÀÏ°ÝÀ» °¡ÇÑ °ÍÀ¸·Î Æò°¡µÈ´Ù. ƯÈ÷ Çù¹Ú°ú ȸÀ¯¿¡ Ãë¾àÇÒ ¼ö¹Û¿¡ ¾ø´Â 20´ë »çȸÃʳâ»ý°ú ³ë³âÃþ¿¡°Ô ¼¼ÀÌÇÁº¸À̽º´Â °¡Àå È¿°úÀûÀÎ ¹æ¾î ¼Ö·ç¼ÇÀ¸·Î¼­ È£ÀÀÀ» ¾ò°í ÀÖ´Ù.

ÇÇÇعæÁö¸¦ À§ÇÑ Ã¹ ´Ü°è, Á¤º¸º¸¾È ÀνÄÀÇ È®¸³
Á¤º¸º¸¾È°èÅë¿¡¼­ ¿À·£ °æ·ÂÀ» ½×¾Æ¿Â È«µ¿Ã¶ ¼ÒÀåÀº °ú°Å °ü·Ã±â¾÷ÀÇ ÃÖ°í±â¼úÃ¥ÀÓÀÚ(CTO)¸¦ ¿ªÀÓÇϱ⵵ ÇßÀ¸¸ç, 2009³â¿¡´Â ¾Èµå·ÎÀÌµå ¹é½ÅÀº ±¹³» ÃÖÃÊ·Î °³¹ßÇϱ⵵ ÇÑ Àü¹®°¡´Ù. ƯÈ÷ ±×´Â ÇÁ·Î±×·¥ °³¹ß°ú ÇØÅ·, ¿î¿µÃ¼Á¦ µî¿¡ ´ëÇÑ Æø³ÐÀº °ü½É°ú ½Ç·ÂÀ» ¹ÙÅÁÀ¸·Î ±¹Á¦ ÇØÅ·´ëȸ¿¡¼­ ¸Å³â ¿ì¼öÇÑ ¼ºÀûÀ» ±â·ÏÇÏ´Â È­ÀÌÆ®ÇØÄ¿·Î¼­µµ ³ôÀº ¸í¼ºÀ» °¡Áö°í ÀÖ´Ù.

ÀÌ·¯ÇÑ ÇØÅ·½Ç·ÂÀ» Åä´ë·Î °³¹ßµÈ °ÍÀÌ ‘½ºÆÄÀ̽ºÄ³³Ê(SpyScanner)’¶ó´Â ¾îÇø®ÄÉÀ̼ÇÀÌ´Ù. ½ºÆÄÀ̽ºÄ³³Ê´Â ½º¸¶Æ®Æù¿¡ ¸ô·¡ ¼³Ä¡µÈ °¨½Ã¾ÛÀ» ºÐ¼®ÇÏ´Â ÇÁ·Î±×·¥À¸·Î ÅëÈ­ Áß ³ìÀ½À̳ª ¹®ÀÚ ¼öÁý µî ¹Î°¨ÇÒ ¼ö ÀÖ´Â °³ÀÎÁ¤º¸ÀÇ À¯ÃâÀ» ¸·À» ¼ö ÀÖ´Â ¼Ö·ç¼ÇÀÌ´Ù. ¿Ã 4¿ù¿¡ °³¹ßµÇ¾î Å×½ºÆ®¸¦ °ÅÄ¡°í 7¿ù °ø½Ä ·ÐĪµÈ ÀÌ ¾îÇÃÀº °ÅÀÇ ¸ðµç °¨½Ã¾ÛÀ» »öÃâÇس¾ ¼ö ÀÖÀ¸¸ç, »õ·Ó°Ô µîÀåÇÏ´Â °¨½Ã¾Û ¶ÇÇÑ º°µµ¿äûÀ» ¹Þ¾Æ ¿Ïº®È÷ ºÐ¼®Çس»°í ÀÖ´Ù. ¶ÇÇÑ ÃÖ±Ù ±¹Á¤¿ø¿¡¼­ ±¸ÀÔÇÑ ÀÌÅ»¸®¾Æ ÇØÅ·¾ÛÀ¸·Î È­Á¦°¡ µÆ´ø ‘RCS’¸¦ °ËÃâÇÒ ¼ö ÀÖ´Â ±â´ÉÀ» Á¦°øÇØ Å©°Ô ÁÖ¸ñ¹Þ±âµµ ÇßÀ¸¸ç, ÇöÀç 5¸¸ ¸í °¡±î¿î ½º¸¶Æ®Æù À¯Àú°¡ »ç¿ëÇÏ°í ÀÖ´Ù.

È« ¼ÒÀåÀº “Çö´ë»çȸÀÇ ¸¹Àº ºÎºÐµéÀº ³×Æ®¿öÅ©ÀÇ Á¤º¸ Àü´ÞÀ» ÅëÇØ ÀÌ·ïÁö°í ÀÖ½À´Ï´Ù. ±×¸¸Å­ ‘Á¤º¸’ÀÇ °¡Ä¡°¡ »ó½ÂÇÏ°í ÀÖ´Ù´Â ¶æÀÔ´Ï´Ù. ÇÇÇظ¦ ¹Ì¿¬¿¡ ¹æÁöÇϱâ À§Çؼ­´Â Á¤ºÎ¿Í ±â¾÷ÀÇ º¸¾È ºÐ¾ß¿¡ ´ëÇÑ °ü½É°ú ÅõÀÚ, ±×¸®°í °³°³ÀÎÀÇ º¸¾È¿¡ ´ëÇÑ ÀνÄÀÌ È®¸³µÇ¾î¾ß ÇÕ´Ï´Ù”¶ó°í °­Á¶Çß´Ù. 

º¸¾È ¾îÇà °³¹ß ¿Ü¿¡µµ ±â¾÷ ³×Å©¿öÅ© ¹× ¼­¹ö, Á¦Ç°ÀÇ Ãë¾àÁ¡ ºÐ¼®°ú ÄÁ¼³ÆÃ, º¸¿ÏÀÛ¾÷À» ¼öÇàÇÏ°í ÀÖ´Â ¿¥½ÃÅ¥¾î´Â ÇØÅ·¹®Á¦¸¦ º¸´Ù ±Ùº»ÀûÀ¸·Î Â÷´ÜÇÒ ¼ö ÀÖ´Â ±â¼ú °³¹ß¿¡ ÁÖ·ÂÇÒ °èȹÀÌ´Ù. ¶ÇÇÑ »õ·Î¿î ±ÝÀ¶º¸¾È¸ðµâÀ» °³¹ßÇÏ°í ¿©Å¸ Á¦Ç°°ú ¿¬°èÇØ º¸´Ù ¾ÈÀüÇÏ°í Æí¸®ÇÑ ±ÝÀ¶°Å·¡ ¼Ö·ç¼ÇÀ» Á¦°øÇϱâ À§ÇØ ³ë·ÂÇÏ°Ú´Ù°í ¹àÇû´Ù. ‘´Ù¸¥ À̵éÀÌ ¸¸µéÁö ¸øÇÏ´Â °ÍÀ» ¸¸µé°Ú´Ù’´Â ¸ðÅä·Î Ç×»ó »õ·Î¿î µµÀüÀ» ¸ØÃßÁö ¾Ê°í ÀÖ´Â ¢ß¿¥½ÃÅ¥¾î¿Í È«µ¿Ã¶ ¼ÒÀå. »ç¶÷µéÀÌ ÇÊ¿ä·Î ÇÏ´Â Á¦Ç°À» ¸¸µé±â À§ÇÑ À̵éÀÇ ÁúÁÖ°¡ ³¡¾øÀÌ °è¼ÓµÇ±â¸¦ ¹Ù¶õ´Ù.

 

Voice pattern recognition blocks voice phishing
Introducing total solution for mobile security
M-Secure CEO Dongcheol Hong

"Cut the line if pin number is constantly required"
We are living in a world where information becomes money. People with wicked idea are constantly targeting our smart phone where many of our personal information is saved. The government urged the industry to bring up countermeasures and is warning the public when a fraudulent case is reported. 4,765 cases of voice phishing was reported in 2013 and 7,635 in 2014 with the total damage of 210 billion won (US$100M). 

In this situation, the advent of M-Secure is a good news. The company is recognized for providing total solution for mobile security. The recent release of M-Secure's 'Safe Voice' app on Google Play is highly praised for its ability to analyse various patterns of voice phishing and cuts the line automatically if personal information is constantly required. CEO Dongcheol Hong said "The existing apps did not provide comprehensive pattern analysis but depended on certain words and URL only. But you don't need to worry anymore as our 'Safe Voice' app will provide ultimate solutions to block voice phishing." Hong secured the vast amount of date with the support of the National Police Agency. 

M-Secure's voice pattern recognition is well appreciated as it gave a blow to voice phishing operators. The app is especially recommended to the early 20s and elderly people who are vulnerable to conciliation and threatening. 

Awareness for information security protects you from voice phishing
Hong worked in the information security field for a long time. He served as Chief Technology Officer (CTO) of a company and developed Adroid vaccine for the first time in Korea in 2009. Not surprisingly, Hong used to be a white hacker who showed excellent performance every year at international hackers competitions. With his hacker's career, Hong developed SpyScanner app. It detects malicious app installed on a smart phone and protects personal information from leaking. It detects almost all the malicious app on the market and keep an eye newly developed apps and updates its detecting performance. It even detected 'RCS', the Italian hacking app used by the Korean National Intelligent Service. The app is currently used by nearly 50,000 people. Hong said "Modern society in a way is moving by transmitting information through networks. It means that the value of information is rising. Equally, the protection of information security is as much important as the convenience we are enjoying." 

In addition to the development of various apps, M-Secure provides services relating to network, server, analysis, consulting and repairing. Hong is also planning to introduce financial solutions by developing a new finance security module. M-Secure's innovation and development will no doubt contribute to the level of information security. 
 


Á¤ÀçÇå ±âÀÚ  jjh05220@naver.com
<ÀúÀÛ±ÇÀÚ © ¿ù°£ÆÄ¿öÄÚ¸®¾Æ, ¹«´Ü ÀüÀç ¹× Àç¹èÆ÷ ±ÝÁö>

Á¤ÀçÇå ±âÀÚÀÇ ´Ù¸¥±â»ç º¸±â
°¡Àå ¸¹ÀÌ º» ±â»ç
¿©¹é
¿©¹é
½Å¹®»ç¼Ò°³¤ý±â»çÁ¦º¸¤ý±¤°í¹®ÀǤýºÒÆí½Å°í¤ý°³ÀÎÁ¤º¸Ãë±Þ¹æħ¤ýû¼Ò³âº¸È£Á¤Ã¥¤ýÀ̸ÞÀϹ«´Ü¼öÁý°ÅºÎ
¢ß´º½º¾Ø¸Å°ÅÁø ÆÄ¿öÄÚ¸®¾Æ ´ëÇ¥ ¹éÁ¾¿ø  |   ¼­¿ïƯº°½Ã ±¤Áø±¸ Á߰ 162-3¹øÁö 2Ãþ  |  ´ëÇ¥ÀüÈ­ : 02-466-5085  |  Æѽº : 02-444-0454
´ëÇ¥¸ÞÀÏ/Á¦ÈÞ±¤°í¹®ÀÇ : bridgekorea@naver.com  |  °³ÀÎÁ¤º¸°ü¸®Ã¥ÀÓÀÚ : ¹éÁ¾¿ø(bridgekorea@naver.com)  |  »ç¾÷ÀÚµî·Ï¹øÈ£ : 591-87-01957
û¼Ò³âº¸È£Ã¥ÀÓÀÚ : ¹éÁ¾¿ø
Disclaimer: PowerKorea makes an article based on the information of products and/or services provided in paper and/or in interview by the company, the organization or the person that is solely responsible for the information.
Copyright © 2008 - 2024 ¿ù°£ÆÄ¿öÄÚ¸®¾Æ. All rights reserved.