Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Maktub Locker Ransomware Knows Where You Live

b2ap3_thumbnail_ransomware_maktub_400.jpgRansomware is so common in the world of online threats that even the FBI has labeled it a massive threat to businesses of all kinds. Unlike other types of malware, ransomware has a unique return on investment that’s measurable and highly lucrative for hackers. A new variant of ransomware called Maktub Locker lures victims into a false sense of security by tailoring phishing emails to match their street address.

Continue reading
0 Comments

Alert: Apple OS X Now at Risk of Ransomware

b2ap3_thumbnail_ransomware_now_affecting_apple_400.jpgRansomware is a major problem in both the personal and private sectors of computing, but up until very recently, Apple users had little to fear from potential ransomware hacks. Security researchers at Palo Alto Networks have discovered what’s known to be the first completed ransomware on an Apple device. The threat, called KeRanger, is officially “in the wild,” and is a danger to any Mac user.

Continue reading
0 Comments

New CryptoJoker Ransomware is No Laughing Matter

b2ap3_thumbnail_problems_with_ransomware_400.jpgToday’s various versions of ransomware are dangerous. By forcibly locking down important files on a victim’s computer, threats like CryptoLocker and CryptoWall are posing significant threats to both businesses and ordinary computer users. However, a new type of ransomware has appeared called CryptoJoker; and we assure you, there’s nothing funny at all about this one.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Email Privacy Hackers Cloud Malware Software Computer Productivity Business Business Computing Microsoft Hardware Backup Network Security Hosted Solutions User Tips Upgrade Google Gmail The Internet of Things Efficiency Operating System Mobile Devices IT Support Workplace Tips Small Business Bandwidth Social Media Smartphone Ransomware Saving Money Big Data Two-factor Authentication Mobile Device Management Business Continuity Smartphones Facebook Outlook Networking Windows Apple Best Practice Innovation Content Filtering Communication Safety Money Apps Website Quick Tips BDR Windows 10 Data storage Passwords Android Hacking Data Disaster Recovery Microsoft Office Compliance BYOD History Black Market Experience Office Tips Information Technology Browser End of Support Business Growth Spam IP Address Office 365 Micrsooft Artificial Intelligence Writing Encryption Society Google Wallet Disaster Social Robot Laptop Windows 8 Hacker Hosted Solution Recovery Virtual Desktop Augmented Reality communications Retail Tech Support WiFi Drones SaaS Remote Computing Unified Communications Automation Holiday Managed IT services Printer Network Running Cable Alert Firewall Lithium-ion battery Gadgets Deep Learning Downtime Bluetooth Document Management Customer Service Law Enforcement Documents Office Memory Wireless Technology Network Congestion App Education Save Money Vendor Management Phishing Proactive IT YouTube LiFi Domains Cryptocurrency Search Monitors Sports Data Recovery Music Streaming Media Analytics Google Docs Visible Light Communication Cleaning Cybercrime Displays Internet of Things Mobile Computing Securty Advertising

Newsletter Sign Up

  • First Name *
  • Last Name *