Networking News
Liquid Video Technologies, Inc. is here to help you. Not understanding the services we provide or need more information on other matters? These blog posts are here to help you and keep you up-to-date.
Google Analytics Used to Steal Credit Cards
Researchers reported that hackers are now exploiting Google's Analytics service to stealthily pilfer credit card information from infected e-commerce sites. According to several independent reports from PerimeterX, Kaspersky, and Sansec, threat actors are now...
New Privacy Features Added to Apple iOS 14
Unprecedented times call for unprecedented measures. No, we're not talking about 'coronavirus,' the current global pandemic because of which Apple—for the very first time in history—organized its Worldwide Developer Conference (WWDC) virtually. Here we're talking...
Cyber Security Index- Exposed Countries
A new Cyber Security Exposure Index (CEI) reveals which countries are the most and least exposed to cyber crime. Which countries are most exposed? According to the Index: From end-point and cloud cyber attacks to the level of commitment to cyber security, the research...
Cyber Attacks Impact Purchase Decisions
New research has found that while most consumers are taking necessary security precautions to protect their online accounts, businesses may not be doing enough to protect their information – inadvertently driving sales to competitors that can. A survey of nearly 2,000...
Android Flaw Lets Attackers Hijack Apps
Remember Strandhogg? A security vulnerability affecting Android that malicious apps can exploit to masquerade as any other app installed on a targeted device to display fake interfaces to the users, tricking them into giving away sensitive information. Late last year,...
Attackers Could Hack Systems via Zoom Chat
If you're using Zoom —especially during this challenging time to cope with your schooling, business, or social engagement—make sure you are running the latest version of the widely popular video conferencing software on your Windows, macOS, or Linux computers. No,...
Security Drift – The Silent Killer
Global spending on cyber security products and services is predicted to exceed $1 trillion during the period of five years, between 2017 to 2021, with different analysts predicting the Compound Annual Growth Rate (CAGR) at anywhere between 8 to 15%. It is not...
6 Cyber Threats You Can’t Afford to Ignore
As if your business didn’t have enough to worry about right now, the spectra of cyber threats looms larger than ever. While it may seem like big names bear the brunt of digital disruption, the reality is far scarier: More than 40 percent of all cyberattacks are...
Integrate Security Early in Design
Many times, when people perform a vulnerability assessment or gap analysis, they think of how much time and money could have been saved by starting the process during the building’s design phase, before it’s ever constructed. When they do an assessment, they evaluate...
Cyber Resilience: A New Look
The need for real-time visibility of an organization’s security posture is becoming increasingly evident. If you don’t know what your current security posture is, you cannot know if what worked for your organization yesterday will also work today. A new threat...
You Need to Be Careful When Banking Online
A new study from FICO found a large percentage of Americans currently do not take the necessary steps to protect their passwords and logins online. As consumers reliance on online services grows in response to COVID-19, the study examined the steps Americans are...
Organizations Use Cybersecurity Products
Data security is creating fear and trust issues for IT professionals, according to the third-annual Oracle and KPMG Cloud Threat Report 2020. The study of 750 cybersecurity and IT professionals across the globe found that a patchwork approach to data security,...
How Video Analytics Help Security
As a rule, there is a lot that video analytics can do to bolster security – whether that’s motion detection for perimeter security; facial recognition for access control; or artificial intelligence (AI) for object classification, to name a few of the possibilities. As...
4000 Android Apps Expose Users’ Data
More than 4,000 Android apps that use Google's cloud-hosted Firebase databases are 'unknowingly' leaking sensitive information on their users, including their email addresses, usernames, passwords, phone numbers, full names, chat messages and location data. The...
Liquid Video Technologies –
Solutions to Fit Your Budget
Liquid Video Technologies offers solutions that are designed to secure your investment in people, equipment, inventory, and eliminate potential frivolous claims. Whether you need to secure a business location or your home, Liquid Video Technologies has a solution to fit your budget. If you need any additional information or would like to speak with one of our Security Specialists, please call (864) 859-9848 or email us at info@liquidvideotechnologies.com
Recent Comments