Networking News
Liquid Video Technologies, Inc. is here to help you. Not understanding the services we provide or need more information on other matters? These blog posts are here to help you and keep you up-to-date.
The Hottest Malware Hits of the Summer
It's been a summer of ransomware hold-ups, supply chain attacks and fileless attacks flying under the radar of old-school security. With malware running amok while we were lying on the beach, here's a recap of the most burning strains and trends seen in the wild...
Video Surveillance by Design
Years ago, installing a new surveillance system often meant finding a comfortable trade-off between improved security and the amount of hardware you were willing to look at on a daily basis. Most security cameras were large, bulky devices, and few options existed for...
Adobe Releases Patches For Flash Player
It's Patch day again—the day of the month when both Adobe and Microsoft release security patches for vulnerabilities in their software. Adobe has just released its monthly security updates to address a total of 3 security vulnerabilities in only two of its products...
8 Advantages of Video Surveillance Systems
Once upon a time, the grainy surveillance systems that operated on analog technology represented a breakthrough in security and monitoring for businesses everywhere. But times have changed, and digital video surveillance is making analog technology obsolete. If you...
Security Assurance More Business-Focused
In a fast-moving environment filled with evolving cyber threats, leaders want confidence that business processes, projects and supporting assets are well protected. Many organizations aspire to an approach that directly links security assurance with the needs of the...
Surveillance’s Critical Role in Retail Security
In the retail industry, new features expand the use of video and help to mitigate crime. A thief broke into one of Fabricio Pareja’s restaurants not long ago, but he didn’t stay long: Just grabbed a few iPads from beside the cash register and bolted. Why the hasty...
Half of Logins on Social Media are Fraud
More than half of logins (53%) on social media sites are fraudulent and 25% of all new account applications on social media are fraud, according to the Q3 Fraud and Abuse Report by Arkose Labs. The report analyzed more than 1.2 billion transactions spanning account...
With WPA3, Wi-Fi Security Is Improving
As anyone working in IT Security knows, Wi-Fi connectivity is a double-edged sword. Our modern, mobile workforce uses Wi-Fi (along with cellular) in ways that make businesses more productive, efficient and profitable than few could have imagined a couple of decades...
Spyware App Now Targets iPhone Owners
Security researchers have discovered a powerful surveillance app first designed for Android devices can now target victims with iPhones. The spy app, found by researchers at mobile security firm Lookout, said its developer abused their Apple-issued enterprise...
How to Secure iPhone Against Cyberattacks
It was in 2011 that mobile malware took off in 2011. That is when hackers began serious attacks on mobile phones, says David Emm, principal security researcher, at Kaspersky Lab, a cyber-security company. “At that point, the data became worth stealing, and since then...
Hackers Know Passwords from Your Typing
A study from Southern Methodist University's Darwin Deason Institute for Cyber-security found that hackers can figure out a person’s password by listening to them type on a keyboard. Aacoustic signals, or sound waves, produced when a person types on a computer...
Attackers are Outpacing the Ability to Defend
A new report reveals how CISOs are shifting priorities and security strategies to manage increasingly advanced threats with limited resources. The Forbes Insight report found that 84 percent of CISOs believe the risks of cyber attacks will increase and almost a...
Major Reasons for Endpoint Security Failure
Endpoint computing is changing like never before, with smartphones, tablets, IoT devices and many other devices and appliances becoming part of the endpoint computing ecosystem for most organizations today. However, as the endpoint computing ecosystem expands,...
Cisco Sold Hackable Surveillance Systems
Cisco Systems has agreed to pay $8.6 million to settle a lawsuit that accused the company of knowingly selling video surveillance system containing severe security vulnerabilities to the U.S. federal and state government agencies. It's believed to be the first payout...
Liquid Video Technologies –
Solutions to Fit Your Budget
Liquid Video Technologies offers solutions that are designed to secure your investment in people, equipment, inventory, and eliminate potential frivolous claims. Whether you need to secure a business location or your home, Liquid Video Technologies has a solution to fit your budget. If you need any additional information or would like to speak with one of our Security Specialists, please call (864) 859-9848 or email us at info@liquidvideotechnologies.com
Recent Comments