Your cart is currently empty!
Uncategorized
SNAP Vulnerabilities: How Magnetic Stripe EBT Cards Fuel a Cybercrime Epidemic
In an era where contactless and chip-based payment technologies dominate, it is both baffling and dangerous that millions of Americans still rely on outdated magnetic stripe EBT cards to access…
Death of the VPN: A Security Eulogy
Trust can be a hard thing to come by in this world but in the world of cybersecurity, trust is virtually non-existent, or at least it should be. VPNs got…
What’s the deal with 5GE?
The other day I looked down at my iPhone X and noticed a conspicuous upgrade. My longtime AT&T 4G LTE designation suddenly changed to 5GE. What’s the deal with 5GE…
Paying Twice At The Pumps: Beware of Bluetooth Skimmers
Consumers looking to fill up at the pump often look for the gas station with the best prices. They are too busy to notice the possibility of nearby cybercriminals stealing…
M2M Blog 4
If all the stages of the data collection system are set up properly, the information is sent wirelessly to a cellular network, transmitted through the Internet and to a server…
Why So Many Prison Calls Being Recorded?
On November 11th an anonymous hacker leaked records of more than 70 million calls stolen from Securus Technologies. Securus provides phone service to land line phones in jails and prisons…
Using Cell Phones for M2M Site Selection? There’s Gotta Be A Better Way
While network engineers can simulate network performance using mathematical models, drive testing and walk-about site surveys are still an essential part of network planning, site selection and troubleshooting. Real world testing…
Have questions?
Berkeley sales and engineering staff will answer all of your technical, delivery and pricing questions. Contact us today.