Networking News
Liquid Video Technologies, Inc. is here to help you. Not understanding the services we provide or need more information on other matters? These blog posts are here to help you and keep you up-to-date.
Steps To Recovery Addiction Treatment Center Leaking PII
Incident Timeline: DATE EVENT March 24, 2019 Open ElasticSearch database discovered. March 24, 2019 stepstorecovery.com emailed via their published email address. March 24, 2019 Hosting provider for ElasticSearch database notified. March 25, 2019 Hosting provider...
A hotspot finder app exposed 2 million Wi-Fi network passwords
A popular hotspot finder app for Android exposed the Wi-Fi network passwords for more than two million networks. The app, downloaded by thousands of users, allowed anyone to search for Wi-Fi networks in their nearby area. The app allows the user to upload Wi-Fi...
Cyber Security Doesn’t Discriminate
Russian hackers are targeting European embassies, according to new report Russian hackers recently attacked a number of embassies in Europe by emailing malicious attachments disguised as official State Department documents to officials, according to a new report from...
As Threats Evolve So Should You
Microsoft Office now the most targeted platform, as browser security improves Microsoft Office has become cybercriminals’ preferred platform when carrying out attacks, and the number of incidents keeps increasing, Kaspersky Lab researchers said during the company’s...
U.S. Patent Granted for Blockchain
Blockchain Patent Granted to Cybersecurity Company Owned by U.S. Defense Contractor Documents published by the United States Patent and Trademark Office (USPTO) on April 16 reveal that Texas-based cybersecurity company Forcepoint has been awarded...
Russia’s Internet Research Agency
Mueller report details how Russians reached millions of US Facebook and Twitter users and brought them out to real-life rallies Special counsel Robert Mueller’s report released Thursday says Russia’s Internet Research Agency, or IRA, reached millions of U.S. users on...
Is Your Smart Home Vulnerable
Spy on your smart home with this open source research tool Researchers at Princeton University have built a web app that lets you (and them) spy on your smart home devices to see what they’re up to. The open source tool, called IoT Inspector, is available for...
Microsoft: Hackers access customer accounts
Microsoft: Hackers compromised support agent’s credentials to access customer email accounts On the heels of a trove of 773 million emails, and tens of millions of passwords, from a variety of domains getting leaked in January, Microsoft has faced another breach...
Cyber Leak: Are You Protected
Hackers publish personal data on thousands of US police officers and federal agents A hacker group has breached several FBI-affiliated websites and uploaded their contents to the web, including dozens of files containing the personal information of thousands of...
High Tech Without Answers
Boeing will cut production of its 737 Max plane amid growing international crisis Boeing said Friday that it will cut production of the 737 Max plane from 52 to 42 per month. The move confirms earlier Reuters reports that this was among options the planemaker...
Every Success Starts Somewhere
How Jeff Bezos decided the first thing Amazon would sell was books Amazon was designed to be an "everything store," according to Brad Stone's book "The Everything Store." But when CEO Jeff Bezos was first thinking about launching the company, he decided to...
Social Channels Are Ruling E-Commerce
THE SOCIAL COMMERCE REPORT: How Facebook, YouTube, Pinterest, and other popular apps are upending the e-commerce space Social media is becoming increasingly influential in shoppers' purchasing decisions. In fact, the top 500 retailers earned an estimated $6.5 billion...
65% Increase In Cloud Attacks
Proofpoint Research Reveals 65% Increase In Cloud Application Attacks In Q1 2019; 40% Of Attacks Originating From Nigeria. Proofpoint, Inc., a leading cybersecurity and compliance company, today released its Cloud Application Attack Snapshot: Q1 2019 research,...
IoT And Your Digital Supply Chain
IoT And Your Digital Supply Chain “Money, it’s a gas. Grab that cash with both hands and make a stash”, Pink Floyd is always near and dear to my heart. No doubt the theme song to a lot of producers of devices that fall into the category of Internet of Things or IoT. I...
Liquid Video Technologies –
Solutions to Fit Your Budget
Liquid Video Technologies offers solutions that are designed to secure your investment in people, equipment, inventory, and eliminate potential frivolous claims. Whether you need to secure a business location or your home, Liquid Video Technologies has a solution to fit your budget. If you need any additional information or would like to speak with one of our Security Specialists, please call (864) 859-9848 or email us at info@liquidvideotechnologies.com
Recent Comments