Networking News
Liquid Video Technologies, Inc. is here to help you. Not understanding the services we provide or need more information on other matters? These blog posts are here to help you and keep you up-to-date.
RCE Bug Found in Homebrew Package
A recently identified security vulnerability in the official Homebrew Cask repository could have been exploited by an RCE bug through an attacker to execute arbitrary code on users' machines that have Homebrew installed. The issue, which was reported to the...
Data Stolen by Hackers From Veterans
Last month security researcher Jeremiah Fowler found an unprotected database that contained private information on hundreds of thousands of U.S. veterans. He also discovered evidence that hackers may have stolen that same data during a cyberattack. The...
Qualcomm Chips Bug Allows Hackers to Spy
Cybersecurity researchers have disclosed a new security vulnerability bug in Qualcomm chips mobile station modems (MSM) that could potentially allow an attacker to leverage the underlying Android operating system to slip malicious code into mobile phones, undetected....
Apple AirDrop Bug – Leak Your Personal Info
New research has uncovered privacy weaknesses in Apple and their wireless file-sharing protocol, AirDrop, that could result in the exposure of a user's contact information such as email addresses and phone numbers. "As an attacker, it is possible to learn the phone...
Best Antivirus for Windows PC
Antivirus software is nearly as crucial as a PC’s operating system. Even if you’re well aware of potential threats and practice extreme caution, some threats just can’t be prevented without the extra help of an AV program—or a full antivirus suite. You could, for...
Pipeline Cyberattack – U.S. in Emergency
The ransomware cyberattack against the Colonial Pipeline network has prompted the U.S. Federal Motor Carrier Safety Administration (FMCSA) to issue a regional emergency declaration in 17 states and the District of Columbia (D.C.). The declaration provides a temporary...
Google – Delete What it Knows About You
Google collects a lot of data about you if you use the company’s services. To its credit, the company makes finding and deleting that data easy by showing most of it on a single website. Here’s how to see the bulk of what Google knows about you, and how to delete it...
Security Tools – Improve Cybersecurity Posture
Today there are plenty of security tools on the market. It is now more important than ever that the security tools you decide to use work well together. If they don't, you will not get the complete picture, and you won't be able to analyze the entire system from a...
Roles Within Cybersecurity 2021
People talk about the cybersecurity job market like it's a monolith, but there are a number of different roles within cybersecurity, depending not only on your skill level and experience but on what you like to do. In particular, CyberSeek.org, a joint industry...
Malware Variations – Sophisticated in 2021
A malicious program intended to cause havoc with IT systems—malware—is becoming more and more sophisticated every year. The year 2021 is no exception, as recent trends indicate that several new variations of the malware are making their way into the world of...
Exposed to Data Breach – How to See in 2021
In early April, security experts made public the details of yet another Facebook data breach, this one exposed over half a billion users. As originally reported by Business Insider, personal information on 533 million Facebook users spanning 106 countries surfaced in...
SolarWinds Cyberattack – U.S. and Russia
The U.S. and U.K. on Thursday formally attributed the supply chain cyberattack of IT infrastructure management company SolarWinds with "high confidence" to government operatives working for Russia's Foreign Intelligence Service (SVR). "Russia's pattern of malign...
Saint Bot – New Malware Snatches Passwords
A previously undocumented malware downloader has been spotted in the wild in phishing attacks to deploy credential stealers and other malicious payloads. Dubbed "Saint Bot," the malware is said to have first appeared on the scene in January 2021, with indications that...
IcedID Malware Delivered by Hackers
Microsoft has warned organizations of a "unique" attack campaign from IcedID malware that abuses contact forms published on websites to deliver malicious links to businesses via emails containing fake legal threats, in what's yet another instance of adversaries...
Liquid Video Technologies –
Solutions to Fit Your Budget
Liquid Video Technologies offers solutions that are designed to secure your investment in people, equipment, inventory, and eliminate potential frivolous claims. Whether you need to secure a business location or your home, Liquid Video Technologies has a solution to fit your budget. If you need any additional information or would like to speak with one of our Security Specialists, please call (864) 859-9848 or email us at info@liquidvideotechnologies.com
Recent Comments