Latest News

Home 5 Blog
IT Services tips to keep you secure while using Public WiFi

IT Services tips to keep you secure while using Public WiFi

Public WiFi isn't limited to just coffee shops and airports these days, they can be found anywhere from malls, hospitals, train stations, sports stadiums and in some parts of the world, even along major roads. Here are some tips taken from an IT services point of view...

read more
Spam and Phishing – Part 2 of 3

Spam and Phishing – Part 2 of 3

Phishing pages migrate to HTTPS Sites have been moving to HTTPS in increasing numbers, and not just legitimate resources. If a year ago a top tip for users was “check that pages requesting personal data are secure,” today a certificate does not guarantee safety:...

read more
Spam & Phishing in 2017 – Part 1

Spam & Phishing in 2017 – Part 1

Figures of the year The share of spam in mail traffic came to 56.63%, down 1.68% against 2016. The biggest source of spam remains the US (13.21%). 40% of spam emails were less than 2 KB in size. The most common malware family found in mail traffic was...

read more
Spam and Phishing – Part 3 of 3

Spam and Phishing – Part 3 of 3

Proportion of spam in email traffic The share of spam in email traffic in 2017 fell by 1.68% to 56.63%. Sources of spam by country In 2017, the US remained the biggest source of spam (13.21%). A 6.59% hike in spam distribution pushed China up to second place (11.25%)....

read more
The Weakest Link In Data Protection – The Human Factor

The Weakest Link In Data Protection – The Human Factor

A company's greatest asset - it's employees - can also be its weakest link, especially in an era wherein mobility and accessibility play a huge role in enhancing productivity. Employee negligence puts an organisation in risk 78% of organisations have suffered from at...

read more
The Current State Of Ransomware – Prevention and Detection

The Current State Of Ransomware – Prevention and Detection

One of the recent examples of such an attack is Bad Rabbit ransomware that hit Ukraine and Russia in late October of 2017. Based on the well-known EternalBlue exploit, it targeted old Windows systems that weren’t properly updated. While the exploit itself has already...

read more
Don’t over-complicate or get complacent with your passwords

Don’t over-complicate or get complacent with your passwords

Passwords are everywhere. From logging in to our social media accounts to buying new shoes, we wouldn’t be able to get much done without first logging in to an account with a password. The problem is, as more and more of our everyday lives have gone online, we’ve had...

read more
How we should accept digital extortion into our lives

How we should accept digital extortion into our lives

Digital extortion has evolved into the most successful criminal business model in the current threat landscape, and Trend Micro researchers predict that it will continue to grow rampant because it’s cheap, easy to commit, and many times the victims pay. The line...

read more
The time to invest in Managed IT services is NOW

The time to invest in Managed IT services is NOW

CompTIA, the world’s leading tech association, recently released a report about the annual trends in the managed services industry. After analysing its findings, here is a concise argument as to why you should invest in managed IT services, particularly in Sydney. The...

read more
IT services block scam attack: CityLink brandjacked!

IT services block scam attack: CityLink brandjacked!

Managed IT service providers were once again able to block fraudulent emails to Sydney users. As the holiday season draws nearer and nearer, the scams are becoming more and more prevalent as well. Thankfully, those who are protected by managed IT experts were able to...

read more
Users beware: Malicious apps found in Google Play Store

Users beware: Malicious apps found in Google Play Store

Many people are lax about their mobile security, downloading apps left and right with no worry about the consequences, since these apps should have been regulated by the publishers. Yet as managed IT service providers know, users in Sydney and all over the world...

read more
Scam alert: Massive phishing scam targets inboxes

Scam alert: Massive phishing scam targets inboxes

Phishing scams are becoming more and more common nowadays. In fact, we almost see a new one every day, with the scams ranging from very obvious to cleverly executed. Yesterday, security expert MailGuard reports that a massive scale phishing scam was launched. It seems...

read more
Hybrid Cloud vs MultiCloud: What you need to know

Hybrid Cloud vs MultiCloud: What you need to know

The Cloud, a term that refers to Internet-based software and services instead of locally on your computer, is becoming a business necessity today. Using the Cloud protects your investments, secures your data, and enables telecommuting and enhanced flexibility. In...

read more
Scammers are after your login information, too!

Scammers are after your login information, too!

Most people think of compromising your credit card information when you are targeted by cyber criminals. However, an even more common scam is one wherein your login credentials are stolen. Read about this latest scam here. There are reports of the new scam that is...

read more
Criminals brandjack PayPal: Is your account compromised?

Criminals brandjack PayPal: Is your account compromised?

PayPal is one of the most trusted payment gateways in the Internet today. However, not even the most trusted brand is safe from cyber criminals. Read about the latest scam to target consumers and IT professionals here. Leading security expert Mailguard recently...

read more
KRACK attacks vulnerable Wi-Fi’s all over Sydney

KRACK attacks vulnerable Wi-Fi’s all over Sydney

Most, if not all of us, utilise Wi-Fi networks in our homes and businesses. If you’re using a mobile device, regardless of the brand and operating system, the chances that you are also connecting to a Wi-Fi network is very probable, too. We’re mentioning this to...

read more
Protect Your Company from These Data Protection Myths

Protect Your Company from These Data Protection Myths

Governments all over the world are cracking down on data protection. Never before has privacy and confidentially been uttered with utmost seriousness in the corporate world. After all, data is the bread and butter of your company. If your data is lost, compromised, or...

read more
Are iOS owners at risk of phishing scam?

Are iOS owners at risk of phishing scam?

Apple sold its billionth iPhone on July 27, 2016, an impressive feat since the brand has been on the shelves for less than 10 years after it was launched on June 29, 2007. It is estimated that at least 700 million iPhones are currently actively being used in the...

read more
Another email scam hits Australia

Another email scam hits Australia

Many companies that offer managed IT services also include impressive security packages for their clients. As the recent spate of phishing attacks in Australia can attest, managed IT in Sydney can improve by a notch or two when it comes to educating users to use...

read more
Create Your Own Ransomware Android App Discovered

Create Your Own Ransomware Android App Discovered

More bad news for device security as the existence of Android Apps which allow even novice tech users to create their own ransomware has been discovered. What's worse is the app appears to generate ransomware with just a few taps using its friendly UI. The days of...

read more
8 Google Chrome Extensions Hacked Last Week

8 Google Chrome Extensions Hacked Last Week

Google Chrome, arguably the world's most popular web browser has come under attack last week from hackers who have managed to compromise eight of its extensions which are readily available on the Chrome Web Store. It's believed that hackers compromised one of the...

read more
Three mobile ransomware you need to look out for

Three mobile ransomware you need to look out for

From file hacking to cryptocurrency stealing to school boy errors, here are three notable mobile ransomware which you should be cautious about. SLocker Largely imitating the Petya ransomware, SLocker combines with the use of the China-based social networking website...

read more
Another E-Toll phishing scam is hitting our inboxes this week

Another E-Toll phishing scam is hitting our inboxes this week

It seems the cyber criminals have taken a liking to the E-Toll emails as a new phishing email is making the rounds, following on from last month's Road and Maritime Services email scam. Fortunately the latest scam is nothing we haven't seen before and it was easy to...

read more
Top IT Support Issues That You Can (Generally) Fix Yourself

Top IT Support Issues That You Can (Generally) Fix Yourself

There’s nothing IT support loves more than assisting clients with their tech issues but generally, there are some common issues which you may fix yourself or at least check to make sure that you are indeed doing the right thing. Unable to log in Left the good old Caps...

read more
“Broadpwn” exploit eliminated with iOS 10.3.3 update

“Broadpwn” exploit eliminated with iOS 10.3.3 update

This release fixes a serious vulnerability in the Wi-Fi chips used in iPhone, iPad, and iPod touch, which allows an attacker to remotely take control of your device over a wireless network. Like a lot of mobile devices, Apple’s use Broadcom chips for Wi-Fi...

read more
Why should you outsource your IT services?

Why should you outsource your IT services?

Small to medium businesses will benefit the most from outsourcing their IT services to a dedicated managed IT services provider. Most businesses are doing so and it continues to be the trend. If you haven't outsourced your IT yet, here are a few points which will...

read more
IT Support News: The Windows 10 Creator Update (RedStone 3)

IT Support News: The Windows 10 Creator Update (RedStone 3)

The much anticipated Windows 10 Creator Update (RedStone 3) is just around corner with it expected to be released around September-October 2017. Also dubbed the "Falls Creator Update" it brings to the table a vast list of improvements to the operating system with a...

read more
Fake Android app infects 14 million devices worldwide

Fake Android app infects 14 million devices worldwide

Dubbed CopyCat, this malware has already infected 14 million devices and has caused nearly AU$2 million in damages in the space of only two months. Out of the 14 million infected devices, 8 million of them were rooted by the malware, 3.8 million devices were used to...

read more
4 of the most destructive Botnets in recent times

4 of the most destructive Botnets in recent times

Botnets are underdogs when it comes to cyber security but if orchestrated properly they can cause a world of destruction, as we will go on to talk about later. Firstly, what is a Botnet? A botnet is a when a device which is connected to the internet gets taken over...

read more
Make software updates a part of your daily regime

Make software updates a part of your daily regime

Any managed IT services company will tell you about the importance of updating your software especially when most think of it as a chore. Understandably the update reminders and restarts prompts will come at a wrong time but it is essential that you adhere to them on...

read more
What do hackers do with your personal data?

What do hackers do with your personal data?

In 2016 fraud and identity theft resulted in $21 billion worth of losses and was proving to be a lucrative gold mine for cyber criminals. Lucrative because it provided hackers with leverage to negotiate ransoms with businesses, organisations and individuals. In some...

read more
WannaCry Ransomware is still around. Right here in Australia!

WannaCry Ransomware is still around. Right here in Australia!

Weeks after the WannaCry ransomware shut down hospitals and businesses across the world, there have been reports of it successfully causing havoc in Japan and Australia. The self-spreading ransomware is still alive and kicking and the latest victims are Honda Motor...

read more
Europe Under Fire: New Ransomware Takes Over Europe

Europe Under Fire: New Ransomware Takes Over Europe

There have been reports of a huge cyber attack which has, so far, crippled firms, airports, banks and government departments across Europe. Code-named 'Petya', it is bearing similar resemblences to the WannaCry hack. What do we know so far? Ukraine has bared the...

read more
Managed IT Services 101 – 5 Advantages Of Cloud Backup

Managed IT Services 101 – 5 Advantages Of Cloud Backup

In light of recent cyber attacks, the spotlight is now on businesses to ensure that they have the right security in place to protect themselves on a daily basis from hackers who are using more and more sophisticated techniques to infiltrate business defences. One huge...

read more
A company has just paid AU$1.3-Million to Ransomware Hackers

A company has just paid AU$1.3-Million to Ransomware Hackers

A South Korean web hosting company fell victim to ransomware hackers and had more than 150 of its servers compromised. Hackers demanded an equivalent of AU$5.8-million in ransom, but after a week of negotiations both parties agreed a fee of around AU$1.3-million - to...

read more
Microsoft PowerPoint can present you with malware

Microsoft PowerPoint can present you with malware

A new social engineering attack has been discovered in the wild, which doesn't require users to enable macros; instead it executes malware on a targeted system using PowerShell commands embedded inside a PowerPoint (PPT) file. In the past attackers have been...

read more
5 Ransomware Defence Pointers For You And Your Business

5 Ransomware Defence Pointers For You And Your Business

Ransomware is now the fastest growing class of malicious software and it has evolved from simple screen blockers demanding payment to something far more dangerous. Don't take the authorities' word Don't rely on word from Government agencies saying they have doused...

read more
Three Of The Best Malware Fails Of All Time

Three Of The Best Malware Fails Of All Time

There have been some malware goofs in the past which are worth talking about. Ranging from the author's identity being revealed to a decryption key being left on an encrypted machine and even some funny malware names. Let's take a look at the three best malware fails...

read more
DocuSign users may want to read this

DocuSign users may want to read this

Electronic signature and digital transaction management firm, DocuSign, reported email address theft on May 15. Despite there being no loss of personal information during the theft, DocuSign say that a malicious third party gained temporary access to a separate,...

read more
New Fake ASIC Emails Unleashed This Week

New Fake ASIC Emails Unleashed This Week

Yet another wave of scam emails have been hitting inboxes this week, fortunately it appears to be something that we've seen before. The scam carries the same ingredients as previous scams - fake email, fake link and malware. The first reports of the scam were on...

read more
IT Services Sydney – Why Outsource Your IT?

IT Services Sydney – Why Outsource Your IT?

IT Services Sydney is usually taken care of in-house or outsourced to a managed IT services company. After all every company has their own circumstances and one offering may work best for one company, with the other offering working best for another company....

read more
Web Security 101 – How Secure Is Your Home Router

Web Security 101 – How Secure Is Your Home Router

Modern day web security means you have to keep all your senses open and be alert to any potential breaches to your security. Not everybody includes their home router on the top of their web security priority list and since it is often over-looked, cyber criminals have...

read more
Move over WannaCry, there’s a new Ransomware in town

Move over WannaCry, there’s a new Ransomware in town

Adylkuzz is a CoinMiner malware, which means that it employs - without user consent - machine resources to mine coins for virtual currencies. It appears to exploit the same vulnerabilities as the WannaCry ransomware did but in a more stealthier fashion. On paper...

read more
Web Security 101 – Top 5 Least Wanted Malware

Web Security 101 – Top 5 Least Wanted Malware

Here at IntelliTeK we make web security a number one priority and we have come up with a list of the top five least wanted malware and how to defend yourself against them. Firstly, let’s define what Malware is – Malware is an abbreviated term derived from “malicious...

read more
WordPress Admins Warned To Be Cautious About Potential Hack

WordPress Admins Warned To Be Cautious About Potential Hack

WordPress, the world’s most popular content management system (CMS), has found itself in the limelight again for the wrong reasons after an issue which was first discovered back in July 2016 has gone public. The issue was first reported to the WordPress security team...

read more
Be Weary Of The New Google Docs Phishing Scam

Be Weary Of The New Google Docs Phishing Scam

Google confirmed that they are aware of the scam and have already taken action to protect users against an email impersonating Google Docs by disabling the offending accounts. The phishing scam followed the same ingredients as other phishing scams by using deceptive...

read more
Why Cloud Services Are More Equipped To Fend Off Email Spam

Why Cloud Services Are More Equipped To Fend Off Email Spam

Email filtering is the process involving the segmentation of certain emails by specific criteria. Included in email filtering is spam filtering where unsolicited and unwanted emails are filtered out so that your inbox or even servers do not get clogged up. Cloud...

read more
Managed IT Services 101 – Think before you click

Managed IT Services 101 – Think before you click

It is usually the managed IT services company who mops up after a security breach and more often than not the breach originates from users clicking on things that look normal to click on. Let's take bogus MYOB emails as an example, there have been attempts by cyber...

read more
6 sneaky techniques criminal hackers use

6 sneaky techniques criminal hackers use

As the years go by criminals take advantage of technological advances and use it for their own methods of attack. Even the simplest things that we take for granted can be used against us. Here are 6 sneaky techniques that attackers may use to attack with:  ...

read more
Choosing The Right MSP For Small Businesses in Sydney

Choosing The Right MSP For Small Businesses in Sydney

Online security issues in Australia are at an all time high so choosing the best managed IT services team for your Sydney business is paramount. The ACCC (Australian Competition and Consumer Commission) reported a billion dollars in losses last year, due to internet...

read more
The Latest In Ransomware Tricks and Predictions

The Latest In Ransomware Tricks and Predictions

Ransomware creators have a number of clever tricks up their sleeves to make sure that they go about their business unnoticed and make it difficult to undo their work. Let's take a look at some of their methods. Name Encryption One of the more latest ransomware...

read more
Malware 101

Malware 101

The term malware seems to be making the headlines more frequently these days especially with all the cyber attacks on banks worldwide and businesses on a whole here in Australia. But in order to fully protect your business from the threat of malware it is important to...

read more
Need managed IT services in the Gold Coast area?

Need managed IT services in the Gold Coast area?

Originally based in North Sydney, IntelliTeK are no strangers to acquiring and serving clients Australia-wide. With clients as far out as Alice Springs, IntelliTeK have no issues with providing the best managed IT services to companies and organisations in the Gold...

read more
What Happened When An Organisation Refused To Pay The Ransom

What Happened When An Organisation Refused To Pay The Ransom

A water company in Arkansas, United States found themselves to be victims of a ransomware attack which encrypted 90,000 files on their server and took only under 2 minutes for it to be completed. Their local managed services provider insisted not to pay the ransom and...

read more