Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Apple OS X Now at Risk of Ransomware

b2ap3_thumbnail_ransomware_now_affecting_apple_400.jpgRansomware is a major problem in both the personal and private sectors of computing, but up until very recently, Apple users had little to fear from potential ransomware hacks. Security researchers at Palo Alto Networks have discovered what’s known to be the first completed ransomware on an Apple device. The threat, called KeRanger, is officially “in the wild,” and is a danger to any Mac user.

Continue reading
0 Comments

Apple Stands Up to the FBI: Legal Battle Ensues

b2ap3_thumbnail_fbi_and_apple_400.jpgThere’s no questioning Apple’s dedication to the advancement of technology, especially over the past few decades. With the iPhone being the first of many commercially available smartphones, Apple has always been at the forefront of exciting consumer technology developments. Now, however, their most important decision yet may come in the form of a face-off with the FBI.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Privacy Email Hackers Cloud Malware Software Microsoft Computer Productivity Business Business Computing Google Hardware Network Security Backup User Tips Hosted Solutions Upgrade Ransomware Gmail The Internet of Things Operating System Efficiency Mobile Devices IT Support Workplace Tips Small Business Bandwidth Social Media Smartphone Android Data Hacking Disaster Recovery Microsoft Office Saving Money Mobile Device Management Big Data Two-factor Authentication Business Continuity Smartphones Facebook Outlook Networking Apple Windows Best Practice Innovation Communication Apps Content Filtering Money Safety BDR Website Data storage Quick Tips Windows 10 Passwords Internet of Things Cybercrime Advertising BYOD Mobile Computing History Securty Black Market Compliance Office Tips Information Technology End of Support Experience Business Growth Spam Browser Micrsooft Artificial Intelligence Society IP Address Writing Google Wallet Office 365 Encryption Robot Social Windows 8 Disaster Laptop Hosted Solution Virtual Desktop communications Hacker Tech Support Augmented Reality Retail Recovery Drones SaaS Automation WiFi Unified Communications Printer Remote Computing Managed IT services Holiday Alert Deep Learning Network Document Management Firewall Bluetooth Running Cable Downtime Law Enforcement Lithium-ion battery Gadgets Office Customer Service Documents Memory Network Congestion Education Vendor Management Wireless Technology Save Money App Proactive IT YouTube Phishing LiFi Cryptocurrency Monitors Data Recovery Music Domains Streaming Media Sports Google Docs Search Visible Light Communication Cleaning Analytics Displays

Newsletter Sign Up

  • First Name *
  • Last Name *