Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Bitcoin Use Reaches Record Levels, Despite Its 2014 Fiasco

b2ap3_thumbnail_new_bitcoin_400.jpgBitcoin, a cryptocurrency used for anonymity on the web, was once the hottest thing on the cyber market. Everyone thought it was a great innovation that allowed for improved online privacy for transactions. Thanks to some rather complicated matters, though, Bitcoin took a nosedive and has needed some time to get back on its feet. Now, it seems people are finally using Bitcoin again, and in a never before seen quantity.

Continue reading
0 Comments

Alert: Hackers Targeting ATMs to Get At Your Cash

b2ap3_thumbnail_atm_malware_400.jpgATMs are probably everyone’s favorite kind of computer. You swipe your card, enter in your PIN, and withdraw cash immediately. Many people forget that an ATM is simply a computer in disguise, though; one that can be infected with malware just as easily as any old PC can. A new type of ATM malware, GreenDispenser, is making its rounds in Mexico, and could potentially make its way to other countries if left unchecked.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Email Privacy Hackers Cloud Malware Software Computer Productivity Business Business Computing Microsoft Hardware Backup Network Security User Tips Hosted Solutions Upgrade Google The Internet of Things Operating System Efficiency Mobile Devices IT Support Workplace Tips Small Business Bandwidth Social Media Smartphone Ransomware Gmail Saving Money Mobile Device Management Big Data Two-factor Authentication Business Continuity Smartphones Outlook Facebook Networking Apple Windows Best Practice Communication Innovation Apps Content Filtering Safety Money BDR Website Quick Tips Data storage Windows 10 Passwords Data Android Hacking Disaster Recovery Microsoft Office Office Tips Compliance Information Technology Experience End of Support Business Growth Spam Micrsooft Browser Artificial Intelligence Society IP Address Writing Google Wallet Office 365 Robot Encryption Social Windows 8 Disaster Hosted Solution Laptop Virtual Desktop Hacker communications Retail Tech Support Recovery Augmented Reality Drones SaaS Unified Communications WiFi Automation Managed IT services Printer Remote Computing Holiday Alert Network Deep Learning Bluetooth Document Management Running Cable Firewall Lithium-ion battery Gadgets Law Enforcement Downtime Customer Service Office Memory Documents Network Congestion Education Save Money Wireless Technology Vendor Management Proactive IT App YouTube Phishing LiFi Cryptocurrency Monitors Data Recovery Music Streaming Media Domains Search Google Docs Sports Visible Light Communication Cleaning Analytics Displays Cybercrime Internet of Things Advertising BYOD Mobile Computing History Black Market Securty

Newsletter Sign Up

  • First Name *
  • Last Name *