Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

You’d think that Intel would make sure their firmware is of sound integrity, but unfortunately, a recently discovered vulnerability has revealed that it’s not as secure as previously thought. The issue involving Intel’s chips could potentially lead to a permanent nosedive for your CPU’s capacity to perform as intended, which could have disastrous implications for your business.

Continue reading
0 Comments

20-Year-Old Exploit Finds New Life as ROBOT

20-Year-Old Exploit Finds New Life as ROBOT

There is no shortage of threats on the Internet, from situational issues to deliberate attacks meant to damage your company or steal your valuable data. While new threats pop up almost every day, some have been around for some time--so long, that many seem to not consider them as viable threats.

Continue reading
0 Comments

100 Countries Hit By Android DDoS Malware

100 Countries Hit By Android DDoS Malware

In what is one of the first attacks of its kind, a botnet dubbed WireX swept across 100 countries, controlling over 120,000 IP addresses at its peak. The factor that made WireX so unique was the fact that the botnet was made up of Android-powered devices that had one of 300 malicious apps downloaded from the Google Play Store.

Continue reading
0 Comments

$100 Million Hacking Incident Shows that No Company is Immune

$100 Million Hacking Incident Shows that No Company is Immune

It’s a tough lesson to learn, but almost any company is susceptible to cyber-attacks that take advantage of any security setup’s weakest link: the people involved. This lesson was most recently learned the hard way by two unnamed tech companies that fell victim to a phishing campaign that was allegedly run by Evaldas Rimasauskas, a Lithuanian man accused of stealing $100 million from them.

Continue reading
0 Comments

Don’t Assume Your New Device is Free of Malware

Don’t Assume Your New Device is Free of Malware

Imagine that, despite the extreme care you took to avoid threats from infecting your devices, they turned out to be infected anyway. However, what if the device had been infected before you had even gotten your hands on it?

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Email Privacy Hackers Cloud Malware Software Business Business Computing Microsoft Computer Productivity Backup Network Security User Tips Hosted Solutions Google Upgrade Hardware Efficiency Mobile Devices IT Support Workplace Tips Small Business Gmail Social Media Operating System Smartphone Ransomware The Internet of Things Bandwidth Communication Business Continuity Apps BDR Data storage Facebook Networking Data Disaster Recovery Windows Innovation Content Filtering Mobile Device Management Money Safety Website Quick Tips Windows 10 Smartphones Passwords Outlook Hacking Android Microsoft Office Saving Money Apple Best Practice Big Data Two-factor Authentication Office IP Address Office 365 Memory Network Congestion Encryption Education Vendor Management Save Money Disaster Laptop YouTube Proactive IT LiFi Hacker Augmented Reality Monitors Cryptocurrency Recovery Streaming Media Data Recovery Music Google Docs Visible Light Communication WiFi Remote Computing Displays Cleaning Holiday Advertising Network Firewall History BYOD Running Cable Downtime Lithium-ion battery Gadgets Black Market Office Tips Information Technology Customer Service End of Support Documents Spam Business Growth Micrsooft Artificial Intelligence Wireless Technology Writing Society App Phishing Google Wallet Robot Social Domains Windows 8 Sports Virtual Desktop Search Hosted Solution communications Analytics Retail Tech Support Internet of Things SaaS Cybercrime Drones Automation Unified Communications Mobile Computing Managed IT services Printer Securty Compliance Alert Deep Learning Experience Bluetooth Document Management Law Enforcement Browser

Newsletter Sign Up

  • First Name *
  • Last Name *