by Liquid Video Technologies | Feb 28, 2019 | Cybersecurity, Data Breaches, Network Security, Networking, News, PCI Breach, PCI Compliance, Security, Security Breach, Technology News, Websites
Cryptojacking is the malicious use of a victim’s computer to mine cryptocurrency, and is a growing problem for both individual users and companies. If you’ve never heard of it before, that’s likely because – up until recently -cryptojacking was a fairly niche...
by Deveren Werne | Feb 25, 2019 | Biometrics, Business, Computer Networking, Cybersecurity, Data Breaches, Https, Network Security, Networking, PCI Breach, PCI Compliance, Security, Security Breach, Technology News
Dunkin’ Donuts’ loyalty program was hit with a credential stuffing attack that targeted names, email addresses, 16-digit DD Perks account numbers and DD Perks QR codes. Dunkin’ Donuts may have just launched its first double-filled doughnut, but another doubling up is...
by Deveren Werne | Feb 22, 2019 | Computer Networking, Cybersecurity, Data Breaches, Home Security, Mobile Access Control, Network Security, Networking, News, Security, Security Breach, Technology News, Websites
Is Your VPN Leaking Your IP Address (Virtual Private Networks) are great for security, but one of the big reasons many people use one is to mask or change their IP address. Thus, one of the essential motivations to utilize a VPN is to conceal your actual IP address....
by Deveren Werne | Feb 21, 2019 | Computer Networking, Cybersecurity, Data Breaches, Network Security, Networking, News, Security, Security Breach, Technology News, Websites
A new study has identified security flaws in five of the most popular password managers. Now for some counter-intuitive advice: I still think you should use a password manager. So do the ethical hackers with Independent Security Evaluators who came to me with news of...
by Liquid Video Technologies | Feb 15, 2019 | Network Security, Networking, News, PCI Breach, Security, Security Breach
The Difference Between a Vulnerability Assessment and a Penetration Test There are many views on what constitutes a Vulnerability Assessment versus a Penetration Test. The main distinction, however, seems to be that some believe a thorough Penetration Test involves...
by Liquid Video Technologies | Sep 4, 2018 | Data Breaches, License Plate Cameras, Networking, Security Cameras, Video Surveillance
Parking management is a crucial component of any building plan, particularly for businesses with limited parking space availability. Spaces for tenants need to be readily accessible and parking management can be significantly more complex if the lot is gated and...
Recent Comments