Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

You’d think that Intel would make sure their firmware is of sound integrity, but unfortunately, a recently discovered vulnerability has revealed that it’s not as secure as previously thought. The issue involving Intel’s chips could potentially lead to a permanent nosedive for your CPU’s capacity to perform as intended, which could have disastrous implications for your business.

Continue reading
0 Comments

20-Year-Old Exploit Finds New Life as ROBOT

20-Year-Old Exploit Finds New Life as ROBOT

There is no shortage of threats on the Internet, from situational issues to deliberate attacks meant to damage your company or steal your valuable data. While new threats pop up almost every day, some have been around for some time--so long, that many seem to not consider them as viable threats.

Continue reading
0 Comments

100 Countries Hit By Android DDoS Malware

100 Countries Hit By Android DDoS Malware

In what is one of the first attacks of its kind, a botnet dubbed WireX swept across 100 countries, controlling over 120,000 IP addresses at its peak. The factor that made WireX so unique was the fact that the botnet was made up of Android-powered devices that had one of 300 malicious apps downloaded from the Google Play Store.

Continue reading
0 Comments

$100 Million Hacking Incident Shows that No Company is Immune

$100 Million Hacking Incident Shows that No Company is Immune

It’s a tough lesson to learn, but almost any company is susceptible to cyber-attacks that take advantage of any security setup’s weakest link: the people involved. This lesson was most recently learned the hard way by two unnamed tech companies that fell victim to a phishing campaign that was allegedly run by Evaldas Rimasauskas, a Lithuanian man accused of stealing $100 million from them.

Continue reading
0 Comments

Don’t Assume Your New Device is Free of Malware

Don’t Assume Your New Device is Free of Malware

Imagine that, despite the extreme care you took to avoid threats from infecting your devices, they turned out to be infected anyway. However, what if the device had been infected before you had even gotten your hands on it?

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Privacy Email Hackers Cloud Malware Software Microsoft Computer Productivity Business Business Computing Upgrade Google Hardware Network Security Backup User Tips Hosted Solutions Social Media Smartphone Gmail Ransomware The Internet of Things Operating System Efficiency Mobile Devices IT Support Workplace Tips Small Business Bandwidth Innovation Content Filtering BDR Money Safety Data storage Website Quick Tips Windows 10 Data Passwords Disaster Recovery Android Hacking Mobile Device Management Microsoft Office Saving Money Big Data Two-factor Authentication Business Continuity Smartphones Outlook Facebook Networking Apple Best Practice Windows Communication Apps Customer Service Network Congestion Education Documents Save Money Vendor Management Proactive IT YouTube Wireless Technology LiFi App Cryptocurrency Monitors Data Recovery Phishing Music Streaming Media Google Docs Visible Light Communication Cleaning Domains Displays Sports Search Analytics Advertising BYOD History Internet of Things Black Market Cybercrime Mobile Computing Office Tips Information Technology End of Support Securty Compliance Business Growth Spam Artificial Intelligence Micrsooft Experience Writing Society Browser Google Wallet Social IP Address Robot Windows 8 Office 365 Encryption Hosted Solution Virtual Desktop Disaster communications Retail Laptop Tech Support Hacker Drones SaaS Recovery Unified Communications Augmented Reality Automation Managed IT services Printer WiFi Alert Remote Computing Deep Learning Bluetooth Holiday Document Management Law Enforcement Network Running Cable Firewall Office Memory Downtime Lithium-ion battery Gadgets

Newsletter Sign Up

  • First Name *
  • Last Name *