Latest News

Home 5 Blog
Spam and Phishing – Part 3 of 3

Spam and Phishing – Part 3 of 3

Proportion of spam in email traffic The share of spam in email traffic in 2017 fell by 1.68% to 56.63%. Sources of spam by country In 2017, the US remained the biggest source of spam (13.21%). A 6.59% hike in spam distribution pushed China up to second place (11.25%)....

read more
Spam and Phishing – Part 2 of 3

Spam and Phishing – Part 2 of 3

Phishing pages migrate to HTTPS Sites have been moving to HTTPS in increasing numbers, and not just legitimate resources. If a year ago a top tip for users was “check that pages requesting personal data are secure,” today a certificate does not guarantee safety:...

read more
Spam & Phishing in 2017 – Part 1

Spam & Phishing in 2017 – Part 1

Figures of the year The share of spam in mail traffic came to 56.63%, down 1.68% against 2016. The biggest source of spam remains the US (13.21%). 40% of spam emails were less than 2 KB in size. The most common malware family found in mail traffic was...

read more
The Weakest Link In Data Protection – The Human Factor

The Weakest Link In Data Protection – The Human Factor

A company's greatest asset - it's employees - can also be its weakest link, especially in an era wherein mobility and accessibility play a huge role in enhancing productivity. Employee negligence puts an organisation in risk 78% of organisations have suffered from at...

read more
The Current State Of Ransomware – Prevention and Detection

The Current State Of Ransomware – Prevention and Detection

One of the recent examples of such an attack is Bad Rabbit ransomware that hit Ukraine and Russia in late October of 2017. Based on the well-known EternalBlue exploit, it targeted old Windows systems that weren’t properly updated. While the exploit itself has already...

read more
How we should accept digital extortion into our lives

How we should accept digital extortion into our lives

Digital extortion has evolved into the most successful criminal business model in the current threat landscape, and Trend Micro researchers predict that it will continue to grow rampant because it’s cheap, easy to commit, and many times the victims pay. The line...

read more
Traditional managed IT services vs. The Cloud

Traditional managed IT services vs. The Cloud

For more than a decade now, cloud computing has been causing massive changes in IT. It’s all about the agile and nimble way of doing things compared to more traditional IT models. What’s changed exactly? Here are a few areas of IT that have been upended by the cloud...

read more
The relationship between managed IT services and the cloud

The relationship between managed IT services and the cloud

The ecosystem around the cloud is growing and changing rapidly, and most of the executives are (re)considering who they partner with and what they partner for to accelerate the value technology brings to their organizations. Managed IT Services is an area that has...

read more
4 Cyber security tips for 2018 – Don’t get left in 2017

4 Cyber security tips for 2018 – Don’t get left in 2017

2018 is the year to learn from 2017's security mistakes. Securing yourself online will only be as good as your practice of it. Modern day cyber security is known to be more innovative and arguably more successful as the years go by. There should be a check list which...

read more
Cloud Wars – Cloud Computing Predictions for 2018

Cloud Wars – Cloud Computing Predictions for 2018

What can we all expect for the year ahead when it comes to the cloud? Managed IT experts and leaders have their say. One thing's for sure, the cloud industry certainly is going to stay static, rather it will continue to innovate and change at rapid pace. Hybrid Cloud...

read more
The time to invest in Managed IT services is NOW

The time to invest in Managed IT services is NOW

CompTIA, the world’s leading tech association, recently released a report about the annual trends in the managed services industry. After analysing its findings, here is a concise argument as to why you should invest in managed IT services, particularly in Sydney. The...

read more
Windows 10 users at risk of getting their passwords hacked

Windows 10 users at risk of getting their passwords hacked

In yet another alarming security nightmare for managed IT service providers in Sydney, a recent blog in the Chromium revealed how Windows 10 users may be at risk of having all their usernames and passwords hacked. Here is everything you need to know about this...

read more
IT services block scam attack: CityLink brandjacked!

IT services block scam attack: CityLink brandjacked!

Managed IT service providers were once again able to block fraudulent emails to Sydney users. As the holiday season draws nearer and nearer, the scams are becoming more and more prevalent as well. Thankfully, those who are protected by managed IT experts were able to...

read more
Users beware: Malicious apps found in Google Play Store

Users beware: Malicious apps found in Google Play Store

Many people are lax about their mobile security, downloading apps left and right with no worry about the consequences, since these apps should have been regulated by the publishers. Yet as managed IT service providers know, users in Sydney and all over the world...

read more
Scam alert: Massive phishing scam targets inboxes

Scam alert: Massive phishing scam targets inboxes

Phishing scams are becoming more and more common nowadays. In fact, we almost see a new one every day, with the scams ranging from very obvious to cleverly executed. Yesterday, security expert MailGuard reports that a massive scale phishing scam was launched. It seems...

read more
Hybrid Cloud vs MultiCloud: What you need to know

Hybrid Cloud vs MultiCloud: What you need to know

The Cloud, a term that refers to Internet-based software and services instead of locally on your computer, is becoming a business necessity today. Using the Cloud protects your investments, secures your data, and enables telecommuting and enhanced flexibility. In...

read more
Scammers are after your login information, too!

Scammers are after your login information, too!

Most people think of compromising your credit card information when you are targeted by cyber criminals. However, an even more common scam is one wherein your login credentials are stolen. Read about this latest scam here. There are reports of the new scam that is...

read more
Criminals brandjack PayPal: Is your account compromised?

Criminals brandjack PayPal: Is your account compromised?

PayPal is one of the most trusted payment gateways in the Internet today. However, not even the most trusted brand is safe from cyber criminals. Read about the latest scam to target consumers and IT professionals here. Leading security expert Mailguard recently...

read more
KRACK attacks vulnerable Wi-Fi’s all over Sydney

KRACK attacks vulnerable Wi-Fi’s all over Sydney

Most, if not all of us, utilise Wi-Fi networks in our homes and businesses. If you’re using a mobile device, regardless of the brand and operating system, the chances that you are also connecting to a Wi-Fi network is very probable, too. We’re mentioning this to...

read more
Protect Your Company from These Data Protection Myths

Protect Your Company from These Data Protection Myths

Governments all over the world are cracking down on data protection. Never before has privacy and confidentially been uttered with utmost seriousness in the corporate world. After all, data is the bread and butter of your company. If your data is lost, compromised, or...

read more
Are iOS owners at risk of phishing scam?

Are iOS owners at risk of phishing scam?

Apple sold its billionth iPhone on July 27, 2016, an impressive feat since the brand has been on the shelves for less than 10 years after it was launched on June 29, 2007. It is estimated that at least 700 million iPhones are currently actively being used in the...

read more
Another email scam hits Australia

Another email scam hits Australia

Many companies that offer managed IT services also include impressive security packages for their clients. As the recent spate of phishing attacks in Australia can attest, managed IT in Sydney can improve by a notch or two when it comes to educating users to use...

read more
Create Your Own Ransomware Android App Discovered

Create Your Own Ransomware Android App Discovered

More bad news for device security as the existence of Android Apps which allow even novice tech users to create their own ransomware has been discovered. What's worse is the app appears to generate ransomware with just a few taps using its friendly UI. The days of...

read more
8 Google Chrome Extensions Hacked Last Week

8 Google Chrome Extensions Hacked Last Week

Google Chrome, arguably the world's most popular web browser has come under attack last week from hackers who have managed to compromise eight of its extensions which are readily available on the Chrome Web Store. It's believed that hackers compromised one of the...

read more
Three mobile ransomware you need to look out for

Three mobile ransomware you need to look out for

From file hacking to cryptocurrency stealing to school boy errors, here are three notable mobile ransomware which you should be cautious about. SLocker Largely imitating the Petya ransomware, SLocker combines with the use of the China-based social networking website...

read more
Top IT Support Issues That You Can (Generally) Fix Yourself

Top IT Support Issues That You Can (Generally) Fix Yourself

There’s nothing IT support loves more than assisting clients with their tech issues but generally, there are some common issues which you may fix yourself or at least check to make sure that you are indeed doing the right thing. Unable to log in Left the good old Caps...

read more
“Broadpwn” exploit eliminated with iOS 10.3.3 update

“Broadpwn” exploit eliminated with iOS 10.3.3 update

This release fixes a serious vulnerability in the Wi-Fi chips used in iPhone, iPad, and iPod touch, which allows an attacker to remotely take control of your device over a wireless network. Like a lot of mobile devices, Apple’s use Broadcom chips for Wi-Fi...

read more
Why should you outsource your IT services?

Why should you outsource your IT services?

Small to medium businesses will benefit the most from outsourcing their IT services to a dedicated managed IT services provider. Most businesses are doing so and it continues to be the trend. If you haven't outsourced your IT yet, here are a few points which will...

read more
IT Support News: The Windows 10 Creator Update (RedStone 3)

IT Support News: The Windows 10 Creator Update (RedStone 3)

The much anticipated Windows 10 Creator Update (RedStone 3) is just around corner with it expected to be released around September-October 2017. Also dubbed the "Falls Creator Update" it brings to the table a vast list of improvements to the operating system with a...

read more
Fake Android app infects 14 million devices worldwide

Fake Android app infects 14 million devices worldwide

Dubbed CopyCat, this malware has already infected 14 million devices and has caused nearly AU$2 million in damages in the space of only two months. Out of the 14 million infected devices, 8 million of them were rooted by the malware, 3.8 million devices were used to...

read more
4 of the most destructive Botnets in recent times

4 of the most destructive Botnets in recent times

Botnets are underdogs when it comes to cyber security but if orchestrated properly they can cause a world of destruction, as we will go on to talk about later. Firstly, what is a Botnet? A botnet is a when a device which is connected to the internet gets taken over...

read more
Make software updates a part of your daily regime

Make software updates a part of your daily regime

Any managed IT services company will tell you about the importance of updating your software especially when most think of it as a chore. Understandably the update reminders and restarts prompts will come at a wrong time but it is essential that you adhere to them on...

read more
What do hackers do with your personal data?

What do hackers do with your personal data?

In 2016 fraud and identity theft resulted in $21 billion worth of losses and was proving to be a lucrative gold mine for cyber criminals. Lucrative because it provided hackers with leverage to negotiate ransoms with businesses, organisations and individuals. In some...

read more
Europe Under Fire: New Ransomware Takes Over Europe

Europe Under Fire: New Ransomware Takes Over Europe

There have been reports of a huge cyber attack which has, so far, crippled firms, airports, banks and government departments across Europe. Code-named 'Petya', it is bearing similar resemblences to the WannaCry hack. What do we know so far? Ukraine has bared the...

read more
Managed IT Services 101 – 5 Advantages Of Cloud Backup

Managed IT Services 101 – 5 Advantages Of Cloud Backup

In light of recent cyber attacks, the spotlight is now on businesses to ensure that they have the right security in place to protect themselves on a daily basis from hackers who are using more and more sophisticated techniques to infiltrate business defences. One huge...

read more
A company has just paid AU$1.3-Million to Ransomware Hackers

A company has just paid AU$1.3-Million to Ransomware Hackers

A South Korean web hosting company fell victim to ransomware hackers and had more than 150 of its servers compromised. Hackers demanded an equivalent of AU$5.8-million in ransom, but after a week of negotiations both parties agreed a fee of around AU$1.3-million - to...

read more
Microsoft PowerPoint can present you with malware

Microsoft PowerPoint can present you with malware

A new social engineering attack has been discovered in the wild, which doesn't require users to enable macros; instead it executes malware on a targeted system using PowerShell commands embedded inside a PowerPoint (PPT) file. In the past attackers have been...

read more
5 Ransomware Defence Pointers For You And Your Business

5 Ransomware Defence Pointers For You And Your Business

Ransomware is now the fastest growing class of malicious software and it has evolved from simple screen blockers demanding payment to something far more dangerous. Don't take the authorities' word Don't rely on word from Government agencies saying they have doused...

read more
Three Of The Best Malware Fails Of All Time

Three Of The Best Malware Fails Of All Time

There have been some malware goofs in the past which are worth talking about. Ranging from the author's identity being revealed to a decryption key being left on an encrypted machine and even some funny malware names. Let's take a look at the three best malware fails...

read more
DocuSign users may want to read this

DocuSign users may want to read this

Electronic signature and digital transaction management firm, DocuSign, reported email address theft on May 15. Despite there being no loss of personal information during the theft, DocuSign say that a malicious third party gained temporary access to a separate,...

read more
New Fake ASIC Emails Unleashed This Week

New Fake ASIC Emails Unleashed This Week

Yet another wave of scam emails have been hitting inboxes this week, fortunately it appears to be something that we've seen before. The scam carries the same ingredients as previous scams - fake email, fake link and malware. The first reports of the scam were on...

read more
IT Services Sydney – Why Outsource Your IT?

IT Services Sydney – Why Outsource Your IT?

IT Services Sydney is usually taken care of in-house or outsourced to a managed IT services company. After all every company has their own circumstances and one offering may work best for one company, with the other offering working best for another company....

read more
Web Security 101 – How Secure Is Your Home Router

Web Security 101 – How Secure Is Your Home Router

Modern day web security means you have to keep all your senses open and be alert to any potential breaches to your security. Not everybody includes their home router on the top of their web security priority list and since it is often over-looked, cyber criminals have...

read more
Move over WannaCry, there’s a new Ransomware in town

Move over WannaCry, there’s a new Ransomware in town

Adylkuzz is a CoinMiner malware, which means that it employs - without user consent - machine resources to mine coins for virtual currencies. It appears to exploit the same vulnerabilities as the WannaCry ransomware did but in a more stealthier fashion. On paper...

read more
Web Security 101 – Top 5 Least Wanted Malware

Web Security 101 – Top 5 Least Wanted Malware

Here at IntelliTeK we make web security a number one priority and we have come up with a list of the top five least wanted malware and how to defend yourself against them. Firstly, let’s define what Malware is – Malware is an abbreviated term derived from “malicious...

read more
WordPress Admins Warned To Be Cautious About Potential Hack

WordPress Admins Warned To Be Cautious About Potential Hack

WordPress, the world’s most popular content management system (CMS), has found itself in the limelight again for the wrong reasons after an issue which was first discovered back in July 2016 has gone public. The issue was first reported to the WordPress security team...

read more
Be Weary Of The New Google Docs Phishing Scam

Be Weary Of The New Google Docs Phishing Scam

Google confirmed that they are aware of the scam and have already taken action to protect users against an email impersonating Google Docs by disabling the offending accounts. The phishing scam followed the same ingredients as other phishing scams by using deceptive...

read more
Managed IT Services 101 – Think before you click

Managed IT Services 101 – Think before you click

It is usually the managed IT services company who mops up after a security breach and more often than not the breach originates from users clicking on things that look normal to click on. Let's take bogus MYOB emails as an example, there have been attempts by cyber...

read more