Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Maktub Locker Ransomware Knows Where You Live

b2ap3_thumbnail_ransomware_maktub_400.jpgRansomware is so common in the world of online threats that even the FBI has labeled it a massive threat to businesses of all kinds. Unlike other types of malware, ransomware has a unique return on investment that’s measurable and highly lucrative for hackers. A new variant of ransomware called Maktub Locker lures victims into a false sense of security by tailoring phishing emails to match their street address.

Continue reading
0 Comments

Alert: Apple OS X Now at Risk of Ransomware

b2ap3_thumbnail_ransomware_now_affecting_apple_400.jpgRansomware is a major problem in both the personal and private sectors of computing, but up until very recently, Apple users had little to fear from potential ransomware hacks. Security researchers at Palo Alto Networks have discovered what’s known to be the first completed ransomware on an Apple device. The threat, called KeRanger, is officially “in the wild,” and is a danger to any Mac user.

Continue reading
0 Comments

New CryptoJoker Ransomware is No Laughing Matter

b2ap3_thumbnail_problems_with_ransomware_400.jpgToday’s various versions of ransomware are dangerous. By forcibly locking down important files on a victim’s computer, threats like CryptoLocker and CryptoWall are posing significant threats to both businesses and ordinary computer users. However, a new type of ransomware has appeared called CryptoJoker; and we assure you, there’s nothing funny at all about this one.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Email Privacy Hackers Cloud Malware Software Business Business Computing Microsoft Computer Productivity Hosted Solutions User Tips Upgrade Google Hardware Backup Network Security Efficiency Mobile Devices IT Support Workplace Tips Small Business Bandwidth Social Media Smartphone Gmail Ransomware The Internet of Things Operating System Outlook Facebook Networking Apple Best Practice Windows Communication Apps Innovation Content Filtering Safety BDR Money Data storage Website Quick Tips Windows 10 Data Passwords Disaster Recovery Android Hacking Microsoft Office Mobile Device Management Saving Money Big Data Two-factor Authentication Business Continuity Smartphones Encryption Hosted Solution Virtual Desktop Disaster communications Retail Laptop Tech Support Drones SaaS Hacker Automation Recovery Unified Communications Augmented Reality Managed IT services Printer WiFi Alert Deep Learning Remote Computing Bluetooth Holiday Document Management Law Enforcement Network Office Running Cable Firewall Lithium-ion battery Gadgets Memory Downtime Network Congestion Education Customer Service Vendor Management Documents Save Money YouTube Proactive IT Wireless Technology LiFi Monitors App Cryptocurrency Streaming Media Data Recovery Phishing Music Google Docs Visible Light Communication Displays Cleaning Domains Search Sports Advertising Analytics History BYOD Internet of Things Black Market Cybercrime Office Tips Information Technology Mobile Computing End of Support Securty Compliance Business Growth Spam Micrsooft Experience Artificial Intelligence Writing Society Browser Google Wallet Robot Social IP Address Office 365 Windows 8

Newsletter Sign Up

  • First Name *
  • Last Name *