Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Router Can Host Some Pretty Nasty Malware

Your Router Can Host Some Pretty Nasty Malware

Hundreds of millions of people use wireless Internet connections every day, and as a result, hackers are taking that as a challenge. They are now starting to develop malware that targets people through their routers. Recently, security researchers at Kaspersky Lab have discovered the malware named Slingshot. The code is designed to spy on PCs through a multi-layer attack that targets MikroTik routers. Today we take a look at Slingshot, and other router-based malware and what you can do about it.

Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Google Hackers Hosted Solutions Backup Malware Microsoft User Tips Mobile Devices Network Security Software Data Windows 10 Internet Innovation Smartphones Business Email Browser Hardware Efficiency Tech Term Computer Business Continuity Disaster Recovery Smartphone VoIP Productivity Workplace Tips Data Backup Ransomware Miscellaneous IT Services Business Management communications Android Productivity Cybercrime Outsourced IT Data Recovery Network Cloud Computing Office Chrome Automation Alert Windows Communication Telephone Systems Computers Router Managed IT Services Internet of Things Save Money Managed IT Services Upgrade Artificial Intelligence Server Collaboration Windows 10 Money Social Media Law Enforcement Virtualization Small Business Quick Tips Facebook Social Engineering Health Holiday IT Support Office Tips Passwords Office 365 App Applications Wi-Fi Spam How To Cybersecurity Password Gadgets Bring Your Own Device Gmail Operating System Mobile Device Management Work/Life Balance Mobile Device Settings History Remote Computing Information BDR Google Drive Two-factor Authentication Word Bandwidth Phishing Private Cloud HaaS Mouse Managed Service Provider Voice over Internet Protocol Entertainment Vulnerability Microsoft Office Hacking Scam Marketing Networking Sports Flexibility Managed Service Encryption Safety Data Protection Keyboard Application Data Management Recovery Connectivity VPN Mobility Data Security Data Breach Apps Meetings Blockchain IT Management Google Docs Fraud Spam Blocking Firewall Employer-Employee Relationship YouTube Legal Access Control Hiring/Firing Black Market Battery eWaste IT Plan Website Telephony Remote Monitoring The Internet of Things Windows 7 Patch Management Managed IT Internet Exlporer Mobile Computing Business Intelligence USB Robot Human Resources Unsupported Software Government Retail Public Cloud Servers Update Training DDoS Best Practice OneNote Botnet Downtime IT Support User Error Software as a Service Social CES Physical Security Identity Theft Redundancy Data storage Big Data End of Support Budget Infrastructure Paperless Office Electronic Medical Records Wearable Technology Cleaning Virtual Assistant BYOD PDF Content Management Data Storage Charger Machine Learning Avoiding Downtime Saving Money Telephone System Comparison Social Networking Information Technology Password Management Search Engine Audiobook SaaS Relocation Shortcut Devices Advertising Virtual Reality Business Mangement Worker Reputation Windows Server 2008 Emergency Knowledge FENG Value Running Cable Shadow IT Fax Server Techology Accountants Display HBO Specifications Music Automobile IT solutions Cortana Wire Augmented Reality Going Green HIPAA NIST Bing Streaming Media Humor Amazon Thought Leadership Windows 10s Smart Technology Worker Commute Recycling Warranty Data loss Rootkit Customers Authentication Network Congestion Employer Employee Relationship Netflix Security Cameras Outlook IBM Lithium-ion battery Files Education Google Apps Smart Office Remote Worker Two Factor Authentication webinar Environment Laptop Wireless Cryptocurrency Help Desk Risk Management Assessment Search Amazon Web Services Skype Criminal Printer Screen Mirroring NarrowBand Maintenance Video Games Remote Work Nanotechnology Flash IT Consultant Wiring Computer Accessories Practices Hacker Frequently Asked Questions Millennials Troubleshooting Supercomputer Computing Infrastructure Workers Document Management Conferencing Uninterrupted Power Supply Touchpad Staff Safe Mode Software Tips Multi-Factor Security Politics Television How to Online Shopping Addiction Solid State Drive Start Menu Hybrid Cloud HVAC Administrator Cast Computer Care Vendor Management Distributed Denial of Service Wireless Technology Scalability Smart Tech Transportation Samsung People Unified Threat Management Travel Bluetooth Programming Biometrics Hosted Computing Smartwatch Excel Workforce Tools Emails Customer Relationship Management Shortcuts Trending Public Computer Apple Evernote Cache MSP Audit Mobile Office Enterprise Content Management Microchip WiFi Content Chromecast Instant Messaging Credit Cards Sync Benefits Leadership Password Manager Camera Root Cause Analysis Monitor Inventory Tip of the week Telecommuting Books Current Events Notifications Internet exploMicrosoft Users Computer Fan Save Time Tech Support Customer Service Digital Signature Vendor Experience iPhone Wireless Charging Wireless Internet File Sharing Company Culture Printers IT solutions Compliance Managing Stress Regulation Thank You Twitter Congratulations CrashOverride Webinar