Networking News
Liquid Video Technologies, Inc. is here to help you. Not understanding the services we provide or need more information on other matters? These blog posts are here to help you and keep you up-to-date.
Cybercriminals Innovate Using Ransomware
Most people enjoy improvements and innovations when it comes to consumer electronics, but the unfortunate truth is that cybercriminals are innovating and improving their techniques and tactics as well. These innovations include “getting a second bite from the...
Coronavirus is Used To Do Phishing Attacks
According to the World Health Organization (WHO), cyber criminals are disguising themselves as WHO to steal money or sensitive information. WHO is aware of suspicious email messages attempting to take advantage of the 2019 novel coronavirus emergency, says the...
iPhone Users Targeted with Bogus Dating App
A malicious email campaign aimed at iPhone owners is making the rounds, using a bouquet of different themes to scam victims, just in time for Valentine’s Day – including a fake dating app. The gambit begins far afield from romance however, with an email from “Nerve...
Chrome Extensions Stealing Private Data
Google removed 500 malicious Chrome extensions from its Web Store after they found to inject malicious ads and siphon off user browsing data to servers under the control of attackers. These extensions were part of a malvertising and ad-fraud campaign that's been...
Top Seven Cybersecurity Trends in 2020
What are the top seven cyber-security trends to be aware of in 2020? TÜV Rheinland released its seventh annual report on Cyber-security Trends for 2020. The report is a collaboration between many cyber-security experts globally, and discusses seven key cyber-security...
Security Cameras – It’s Not Just About Quality
In the world of video cameras, it’s well understood that higher megapixel (MP) image sensors in a camera can capture more picture detail. However, there’s much more to image quality than pure megapixels since the quality and size of the sensor along with the lens...
Guide to Mitigate Cloud Vulnerabilities
The National Security Agency (NSA) has released an information sheet with guidance on mitigating cloud vulnerabilities. NSA identifies cloud security components and discusses threat actors, cloud vulnerabilities and potential mitigation measures. The document divides...
Airports are Vulnerable to a Cyberattack
New research finds that 97 out of 100 the world's largest airports have security risks related to vulnerable web and mobile applications, misconfigured public cloud, Dark Web exposure or code repositories leaks. The report from web security company ImmuniWeb is based...
Microsoft Customer Support Records Exposed
If you have ever contacted Microsoft for support in the past 14 years, your technical query, along with some personally identifiable information might have been compromised. Microsoft today admitted a security incident that exposed nearly 250 million "Customer Service...
Evaluating Your Security Controls?
Testing security controls is the only way to know if they are truly defending your organization. With many different testing frameworks and tools to choose from, you have lots of options. But what do you specifically want to know? And how are the findings relevant to...
$1.5 Million Award for Google Hackers
Google is willing to award up to $1.5 million to hackers who can successfully hack its Titan M security chip on the company’s Pixel devices as part of an expansion of its Android bug-bounty program unveiled this week. The company revealed increased payouts to its...
Security Flaws Found in Children’s Toys
Several toys that were tested have been found lacking authentication measures, opening them up to an array of insidious attacks. Various connected toys for children – hot off the shelves from this holiday shopping season – have been found with deep-rooted security...
Advance Protection Program for Google
Great news for iOS users! You can now use your iPhone or iPad, running iOS 10 or later, as a physical security key for securely logging into your Google account as part of the Advanced Protection Program for two-factor authentication. Android users have had this...
Gas Pump Transaction Scams
Gas stations will become liable for card-skimming at their pay-at-the-pump mechanisms starting in October. Gas stations are gearing up for a major change in credit-card fraud liability in October, when they will find themselves on the hook for card-skimming attacks at...
Liquid Video Technologies –
Solutions to Fit Your Budget
Liquid Video Technologies offers solutions that are designed to secure your investment in people, equipment, inventory, and eliminate potential frivolous claims. Whether you need to secure a business location or your home, Liquid Video Technologies has a solution to fit your budget. If you need any additional information or would like to speak with one of our Security Specialists, please call (864) 859-9848 or email us at info@liquidvideotechnologies.com
Recent Comments