Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Maktub Locker Ransomware Knows Where You Live

b2ap3_thumbnail_ransomware_maktub_400.jpgRansomware is so common in the world of online threats that even the FBI has labeled it a massive threat to businesses of all kinds. Unlike other types of malware, ransomware has a unique return on investment that’s measurable and highly lucrative for hackers. A new variant of ransomware called Maktub Locker lures victims into a false sense of security by tailoring phishing emails to match their street address.

Continue reading
0 Comments

Alert: Apple OS X Now at Risk of Ransomware

b2ap3_thumbnail_ransomware_now_affecting_apple_400.jpgRansomware is a major problem in both the personal and private sectors of computing, but up until very recently, Apple users had little to fear from potential ransomware hacks. Security researchers at Palo Alto Networks have discovered what’s known to be the first completed ransomware on an Apple device. The threat, called KeRanger, is officially “in the wild,” and is a danger to any Mac user.

Continue reading
0 Comments

New CryptoJoker Ransomware is No Laughing Matter

b2ap3_thumbnail_problems_with_ransomware_400.jpgToday’s various versions of ransomware are dangerous. By forcibly locking down important files on a victim’s computer, threats like CryptoLocker and CryptoWall are posing significant threats to both businesses and ordinary computer users. However, a new type of ransomware has appeared called CryptoJoker; and we assure you, there’s nothing funny at all about this one.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Email Privacy Hackers Cloud Malware Software Computer Productivity Business Business Computing Microsoft Hardware Network Security Backup User Tips Hosted Solutions Upgrade Google The Internet of Things Efficiency Mobile Devices IT Support Bandwidth Workplace Tips Small Business Social Media Gmail Smartphone Ransomware Operating System Saving Money Big Data Smartphones Two-factor Authentication Outlook Business Continuity Apple Best Practice Facebook Communication Networking Apps Windows BDR Data storage Innovation Content Filtering Money Safety Website Data Quick Tips Disaster Recovery Windows 10 Passwords Mobile Device Management Android Hacking Microsoft Office Robot Social Compliance Windows 8 Experience Virtual Desktop Hosted Solution communications Browser IP Address Retail Tech Support SaaS Office 365 Drones Automation Unified Communications Encryption Managed IT services Printer Disaster Alert Laptop Deep Learning Hacker Augmented Reality Bluetooth Document Management Recovery Law Enforcement Office WiFi Remote Computing Memory Education Holiday Network Congestion Vendor Management Save Money Network Firewall Proactive IT YouTube Running Cable LiFi Downtime Lithium-ion battery Gadgets Monitors Cryptocurrency Customer Service Data Recovery Music Streaming Media Documents Visible Light Communication Google Docs Displays Cleaning Wireless Technology App Advertising Phishing History BYOD Domains Black Market Information Technology Sports Search Office Tips End of Support Analytics Business Growth Spam Artificial Intelligence Internet of Things Cybercrime Micrsooft Mobile Computing Writing Society Securty Google Wallet

Newsletter Sign Up

  • First Name *
  • Last Name *