Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

You’d think that Intel would make sure their firmware is of sound integrity, but unfortunately, a recently discovered vulnerability has revealed that it’s not as secure as previously thought. The issue involving Intel’s chips could potentially lead to a permanent nosedive for your CPU’s capacity to perform as intended, which could have disastrous implications for your business.

Continue reading
0 Comments

20-Year-Old Exploit Finds New Life as ROBOT

20-Year-Old Exploit Finds New Life as ROBOT

There is no shortage of threats on the Internet, from situational issues to deliberate attacks meant to damage your company or steal your valuable data. While new threats pop up almost every day, some have been around for some time--so long, that many seem to not consider them as viable threats.

Continue reading
0 Comments

100 Countries Hit By Android DDoS Malware

100 Countries Hit By Android DDoS Malware

In what is one of the first attacks of its kind, a botnet dubbed WireX swept across 100 countries, controlling over 120,000 IP addresses at its peak. The factor that made WireX so unique was the fact that the botnet was made up of Android-powered devices that had one of 300 malicious apps downloaded from the Google Play Store.

Continue reading
0 Comments

$100 Million Hacking Incident Shows that No Company is Immune

$100 Million Hacking Incident Shows that No Company is Immune

It’s a tough lesson to learn, but almost any company is susceptible to cyber-attacks that take advantage of any security setup’s weakest link: the people involved. This lesson was most recently learned the hard way by two unnamed tech companies that fell victim to a phishing campaign that was allegedly run by Evaldas Rimasauskas, a Lithuanian man accused of stealing $100 million from them.

Continue reading
0 Comments

Don’t Assume Your New Device is Free of Malware

Don’t Assume Your New Device is Free of Malware

Imagine that, despite the extreme care you took to avoid threats from infecting your devices, they turned out to be infected anyway. However, what if the device had been infected before you had even gotten your hands on it?

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Privacy Email Hackers Cloud Malware Software Business Business Computing Microsoft Computer Productivity Google Hosted Solutions User Tips Upgrade Hardware Backup Network Security Gmail Workplace Tips Small Business Operating System Social Media Smartphone Ransomware Bandwidth The Internet of Things Efficiency Mobile Devices IT Support Data Disaster Recovery Networking Windows Mobile Device Management Innovation Content Filtering Safety Money Smartphones Website Outlook Quick Tips Windows 10 Passwords Hacking Android Apple Best Practice Microsoft Office Communication Saving Money Apps Big Data Two-factor Authentication BDR Business Continuity Data storage Facebook Recovery Augmented Reality Advertising History WiFi BYOD Black Market Remote Computing Office Tips Information Technology Holiday End of Support Network Spam Running Cable Business Growth Firewall Micrsooft Lithium-ion battery Artificial Intelligence Gadgets Downtime Writing Society Customer Service Documents Google Wallet Robot Social Wireless Technology Windows 8 Virtual Desktop App Hosted Solution communications Phishing Retail Tech Support SaaS Drones Domains Sports Automation Search Unified Communications Managed IT services Printer Analytics Alert Internet of Things Deep Learning Cybercrime Bluetooth Document Management Mobile Computing Securty Law Enforcement Compliance Office Memory Experience Education Network Congestion Browser Vendor Management Save Money Proactive IT IP Address YouTube Office 365 LiFi Encryption Monitors Cryptocurrency Streaming Media Data Recovery Disaster Music Google Docs Visible Light Communication Laptop Displays Cleaning Hacker

Newsletter Sign Up

  • First Name *
  • Last Name *