Networking News
Liquid Video Technologies, Inc. is here to help you. Not understanding the services we provide or need more information on other matters? These blog posts are here to help you and keep you up-to-date.
Microsoft Security Software Patch 2021
Microsoft today rolled out updates to plug at least 56 security holes in its Windows operating systems and other software. One of the bugs is already being actively exploited, and six of them were publicized prior to today, potentially giving attackers a head start in...
SaaS Settings Misconfigured: Weakest Link
SaaS Security Posture Management (SSPM) is critical to today's company security. Recently Malwarebytes released a statement on how they were targeted by Nation-State Actors implicated in SolarWinds breach. Their investigation suggested abuse of privileged access to...
Hack From Poor Password Security
New details have emerged about the remote computer intrusion at a Florida water treatment facility last Friday, highlighting a lack of adequate security measures needed to bulletproof critical infrastructure environments and stop a hack. The breach involved...
Supercharge Your Security With 5 Steps
Protecting your personal data isn’t just smart these days—it’s a necessity. As the world grows more and more connected, your private info becomes more and more valuable. Whether it’s using leaked info from website breaches to hack into your other accounts or holding...
Human Error – #1 Cyber Security Threat
Human Error While technical solutions like spam filters and mobile device management systems are important for protecting end-users, with the number of threats and the multitude of systems and communications through which staff performs work, the one unifying risk...
Hijacking Google Chrome Extensions
New details have emerged about a vast network of rogue extensions for Chrome and Edge browsers that were found hijacking clicks to links in search results pages to arbitrary URLs, including phishing sites and ads. Collectively called "CacheFlow" by Avast, the 28...
Supply Chain Infiltration: Ways to Protect
The far-reaching SolarWinds Orion attack has catapulted supply chain security vulnerabilities into the spotlight – particularly those involving the third-party software applications and hardware components that comprise much of today’s enterprise IT environments. The...
Apple Patches Three Exploits
An anonymous researcher identified bugs in the software kernel and WebKit browser engine on Apple iOS that are likely part of an exploit chain. Apple continues to put out potential security fires by patching zero-day vulnerabilities, releasing an emergency update this...
Cryptocurrency Security Breach – BuyUCoin
Another day, and another report that a cryptocurrency exchange has been breached by malicious hackers. Indian cryptocurrency exchange BuyUCoin says that is investigating claims that sensitive data related to hundreds of thousands of its users has been published on the...
Cyber-Attacks: Biggest From 2020
With so much of the world transitioning to working, shopping, studying, and streaming online during the coronavirus pandemic, cybercriminals now have access to a larger base of potential victims than ever before through cyber-attacks. "Zoombomb" became the new...
Cybersecurity Failure Among Highest Risks
The 16th edition of the World Economic Forum’s (WEF) Global Risk Report was released on Tuesday, and many of the risks/threats contained are unsurprising. The results are based on the Global Risks Perception Survey and were completed by 650 members of the World...
Startup Business’s Importance on Security
When you are a startup, there are umpteen things that demand your attention. You must give your hundred percent (probably even more!) to work effectively and efficiently with the limited resources. Understandably, the application security importance may be pushed at...
Security in 2021: What lies ahead
If there's one thing we learned in 2020, it's how to adapt. Companies compressed years-long digital transformation plans into a matter of weeks. Companies that "don't do remote" suddenly had to "do remote" and found it wasn't that bad. We got VPNs, external services,...
‘Designated’ DNS-over-HTTPS
Why Designated DNS-over-HTTPS? The U.S. National Security Agency (NSA) on Friday said DNS over HTTPS (DoH) — if configured appropriately in enterprise environments — can help prevent "numerous" initial access, command-and-control, and exfiltration techniques used by...
Liquid Video Technologies –
Solutions to Fit Your Budget
Liquid Video Technologies offers solutions that are designed to secure your investment in people, equipment, inventory, and eliminate potential frivolous claims. Whether you need to secure a business location or your home, Liquid Video Technologies has a solution to fit your budget. If you need any additional information or would like to speak with one of our Security Specialists, please call (864) 859-9848 or email us at info@liquidvideotechnologies.com
Recent Comments