Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Maktub Locker Ransomware Knows Where You Live

b2ap3_thumbnail_ransomware_maktub_400.jpgRansomware is so common in the world of online threats that even the FBI has labeled it a massive threat to businesses of all kinds. Unlike other types of malware, ransomware has a unique return on investment that’s measurable and highly lucrative for hackers. A new variant of ransomware called Maktub Locker lures victims into a false sense of security by tailoring phishing emails to match their street address.

Continue reading
0 Comments

Alert: Apple OS X Now at Risk of Ransomware

b2ap3_thumbnail_ransomware_now_affecting_apple_400.jpgRansomware is a major problem in both the personal and private sectors of computing, but up until very recently, Apple users had little to fear from potential ransomware hacks. Security researchers at Palo Alto Networks have discovered what’s known to be the first completed ransomware on an Apple device. The threat, called KeRanger, is officially “in the wild,” and is a danger to any Mac user.

Continue reading
0 Comments

New CryptoJoker Ransomware is No Laughing Matter

b2ap3_thumbnail_problems_with_ransomware_400.jpgToday’s various versions of ransomware are dangerous. By forcibly locking down important files on a victim’s computer, threats like CryptoLocker and CryptoWall are posing significant threats to both businesses and ordinary computer users. However, a new type of ransomware has appeared called CryptoJoker; and we assure you, there’s nothing funny at all about this one.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Privacy Email Hackers Cloud Malware Software Microsoft Computer Productivity Business Business Computing Hardware Backup Network Security Google User Tips Hosted Solutions Upgrade Bandwidth Ransomware The Internet of Things Efficiency Mobile Devices IT Support Gmail Workplace Tips Small Business Operating System Social Media Smartphone Android Hacking Communication Apps Microsoft Office Saving Money Big Data BDR Two-factor Authentication Data storage Business Continuity Data Disaster Recovery Facebook Networking Mobile Device Management Windows Innovation Smartphones Content Filtering Money Safety Outlook Website Quick Tips Windows 10 Passwords Apple Best Practice Bluetooth Document Management Cybercrime Law Enforcement Internet of Things Mobile Computing Office Memory Securty Network Congestion Compliance Education Save Money Experience Vendor Management Proactive IT YouTube Browser LiFi Cryptocurrency IP Address Monitors Data Recovery Music Streaming Media Office 365 Google Docs Encryption Visible Light Communication Cleaning Disaster Displays Laptop Hacker Advertising BYOD Recovery Augmented Reality History Black Market WiFi Office Tips Information Technology End of Support Remote Computing Business Growth Holiday Spam Artificial Intelligence Network Micrsooft Writing Society Running Cable Firewall Gadgets Google Wallet Downtime Lithium-ion battery Social Customer Service Robot Windows 8 Documents Hosted Solution Virtual Desktop communications Wireless Technology Retail Tech Support App Drones Phishing SaaS Unified Communications Automation Managed IT services Printer Domains Search Sports Alert Analytics Deep Learning

Newsletter Sign Up

  • First Name *
  • Last Name *