by Liquid Video Technologies | Jun 17, 2019 | Access Control, Business, Computer Networking, Cybersecurity, Network Security, Networking, News, Security, Technology News
Thailand passes controversial cybersecurity law that could enable government surveillance Thailand’s government passed a controversial cybersecurity bill today that has been criticized for vagueness and the potential to enable sweeping access to internet user data....
by Liquid Video Technologies | Jun 14, 2019 | Business, Computer Networking, Cybersecurity, Data Breaches, Network Security, Networking, News, Security, Technology News, Websites
New Privacy Features for Mozilla Firefox, Lockwise Is Live Mozilla announced new features and changes today that aim to increase the privacy of Firefox users by blocking trackers and offering updates to various Firefox security and privacy services. These changes...
by Liquid Video Technologies | Jun 12, 2019 | Access Control, Business, Computer Networking, Cybersecurity, Data Breaches, Network Security, Networking, News, Security, Security Breach, Technology News
Windows 10 Apps Hit by Malicious Ads that Blockers Won’t Stop Windows 10 users in Germany are reporting that while using their computer, their default browser would suddenly open to malicious and scam advertisements. These advertisements are being shown by...
by Liquid Video Technologies | Jun 10, 2019 | Business, Computer Networking, Cybersecurity, Network Security, Networking, News, Security, Security Breach, Technology News, Websites
You might be surprised what you can buy on Facebook, if you know where to look. Researchers with Cisco’s Talos security research team have uncovered a wave of Facebook groups dedicated to making money from a variety of illicit and otherwise sketchy online behaviors,...
by Liquid Video Technologies | Jun 7, 2019 | Access Control, Business, Computer Networking, Cybersecurity, Network Security, Networking, News, Security, Security Breach, Technology News
Why local governments are a hot target for cyberattacks Recent ransomware and other attacks underscore the value attackers see in the data stored in city and regional government systems. Here’s why they are vulnerable and what they can do to reduce the threat....
Recent Comments