Network Technologies of Kansas

Archive for February, 2022

Mac Malware Is Becoming A Bigger Threat For Users

In late 2020 a new strain of malware called UpdateAgent appeared and began infecting Mac users. Initially the strain wasn't all that worrisome.  It stole system information but it was by no ...

Additional Security Recently Added To Office 365

Back in September of 2020 Microsoft announced that it was experimenting with the addition of SMTP MTA Strict Transport Security (MTA-STS) support to Exchange Online. This was done in a bid to ...

New Android Malware Steals Data And Factory Resets Phones

BRATA malware was first spotted in the wilds by Kaspersky back in 2019. Its earliest incarnation saw it targeting e-banking users and it was designed to steal banking and login credentials of ...

Suspicious Files Get New Warnings In Google Drive

If you have Google Drive, there's good news.  The company has recently announced that soon they'll be rolling out a new feature to help alert users to the presence of suspicious documents. ...

High Profile Instagram Accounts Being Held For Ransom By Hackers

Hackers have recently hit upon a new money-making scheme.  Some groups have started breaking into Instagram accounts belonging to people with high numbers of followers. They are then holding those accounts hostage ...

Dark Herring Subscription Scam Affected Millions Of Android Users

Google partner Zimperium zLabs has recently discovered a sophisticated scam targeting more than 100 million Android users. The scam has been in operation right under Google's nose for nearly two years. The ...

Apple Released A Fix For Multiple Zero Day Exploits

There's good news for Apple users. The company has been busy and has recently released security updates that address two Zero-Day vulnerabilities. These are security flaws that could be exploited by hackers ...

Android Apps Are Coming To Windows 11

One of the most persistently frustrating aspects of our highly interconnected world is that we seem to exist in at least three different distinct ecosystems. Apple users live in the Apple ecosystem ...

E-Mail From Department Of Labor Could Be Phishing Attack

There is a new phishing campaign to keep a watchful eye on according to email security firm INKY. It's a particularly fiendish one. The attackers have designed an email template that does ...

Vulnerability In This Cisco Software Could Allow Hackers Access

Cisco recently discovered a critical security flaw in their Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS.  The vulnerability allowed an attacker to execute code arbitrarily and gain root-level access on any ...

Blog

Hiatus Malware Targets Business Routers

Hiatus Malware Targets Business Routers

There is a new malware campaign targeting business-grade routers. It is called Hiatus, a complex operation that deploys the HiatusRAT[...]
Cerebral Data Breach – 3.18 Million Affected

Cerebral Data Breach – 3.18 Million Affected

Cerebral, an online platform that offers mental health care services, recently suffered a data breach that may have affected up[...]
Reduce the Risk of Business Email Compromise Attacks

Reduce the Risk of Business Email Compromise Attacks

Email threats have been around since the early 90s. But phishing techniques are much more sophisticated now than they were[...]

Locations

Topeka (HQ)

2008 SW Gage Blvd.
Topeka, KS 66604
(785) 409-6286

Company

Since 1999, Network Technologies of Kansas has been a leading provider of IT support and consulting, focusing on small and medium sized businesses in Topeka and surrounding areas. We have helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite